May 13 00:14:36.718043 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 13 00:14:36.718063 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon May 12 23:22:00 -00 2025 May 13 00:14:36.718071 kernel: efi: EFI v2.70 by EDK II May 13 00:14:36.718077 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 13 00:14:36.718082 kernel: random: crng init done May 13 00:14:36.718088 kernel: ACPI: Early table checksum verification disabled May 13 00:14:36.718094 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 13 00:14:36.718101 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 13 00:14:36.718107 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:14:36.718112 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:14:36.718118 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:14:36.718124 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:14:36.718129 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:14:36.718135 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:14:36.718143 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:14:36.718149 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:14:36.718155 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:14:36.718161 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 13 00:14:36.718167 kernel: NUMA: Failed to initialise from firmware May 13 00:14:36.718173 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:14:36.718179 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 13 00:14:36.718185 kernel: Zone ranges: May 13 00:14:36.718191 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:14:36.718198 kernel: DMA32 empty May 13 00:14:36.718204 kernel: Normal empty May 13 00:14:36.718210 kernel: Movable zone start for each node May 13 00:14:36.718232 kernel: Early memory node ranges May 13 00:14:36.718238 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 13 00:14:36.718244 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 13 00:14:36.718250 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 13 00:14:36.718256 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 13 00:14:36.718262 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 13 00:14:36.718268 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 13 00:14:36.718274 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 13 00:14:36.718280 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:14:36.718287 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 13 00:14:36.718293 kernel: psci: probing for conduit method from ACPI. May 13 00:14:36.718299 kernel: psci: PSCIv1.1 detected in firmware. May 13 00:14:36.718305 kernel: psci: Using standard PSCI v0.2 function IDs May 13 00:14:36.718311 kernel: psci: Trusted OS migration not required May 13 00:14:36.718320 kernel: psci: SMC Calling Convention v1.1 May 13 00:14:36.718326 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 13 00:14:36.718334 kernel: ACPI: SRAT not present May 13 00:14:36.718340 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 13 00:14:36.718347 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 13 00:14:36.718353 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 13 00:14:36.718366 kernel: Detected PIPT I-cache on CPU0 May 13 00:14:36.718373 kernel: CPU features: detected: GIC system register CPU interface May 13 00:14:36.718379 kernel: CPU features: detected: Hardware dirty bit management May 13 00:14:36.718386 kernel: CPU features: detected: Spectre-v4 May 13 00:14:36.718392 kernel: CPU features: detected: Spectre-BHB May 13 00:14:36.718400 kernel: CPU features: kernel page table isolation forced ON by KASLR May 13 00:14:36.718407 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 13 00:14:36.718413 kernel: CPU features: detected: ARM erratum 1418040 May 13 00:14:36.718419 kernel: CPU features: detected: SSBS not fully self-synchronizing May 13 00:14:36.718426 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 13 00:14:36.718432 kernel: Policy zone: DMA May 13 00:14:36.718440 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=ae60136413c5686d5b1e9c38408a367f831e354d706496e9f743f02289aad53d May 13 00:14:36.718446 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:14:36.718453 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 00:14:36.718459 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:14:36.718465 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:14:36.718473 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36480K init, 777K bss, 114948K reserved, 0K cma-reserved) May 13 00:14:36.718480 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 13 00:14:36.718486 kernel: trace event string verifier disabled May 13 00:14:36.718492 kernel: rcu: Preemptible hierarchical RCU implementation. May 13 00:14:36.718499 kernel: rcu: RCU event tracing is enabled. May 13 00:14:36.718506 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 13 00:14:36.718512 kernel: Trampoline variant of Tasks RCU enabled. May 13 00:14:36.718519 kernel: Tracing variant of Tasks RCU enabled. May 13 00:14:36.718525 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:14:36.718531 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 13 00:14:36.720635 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 13 00:14:36.720651 kernel: GICv3: 256 SPIs implemented May 13 00:14:36.720657 kernel: GICv3: 0 Extended SPIs implemented May 13 00:14:36.720664 kernel: GICv3: Distributor has no Range Selector support May 13 00:14:36.720670 kernel: Root IRQ handler: gic_handle_irq May 13 00:14:36.720677 kernel: GICv3: 16 PPIs implemented May 13 00:14:36.720683 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 13 00:14:36.720690 kernel: ACPI: SRAT not present May 13 00:14:36.720696 kernel: ITS [mem 0x08080000-0x0809ffff] May 13 00:14:36.720703 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 13 00:14:36.720710 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 13 00:14:36.720716 kernel: GICv3: using LPI property table @0x00000000400d0000 May 13 00:14:36.720722 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 13 00:14:36.720730 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:14:36.720736 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 13 00:14:36.720743 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 13 00:14:36.720750 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 13 00:14:36.720756 kernel: arm-pv: using stolen time PV May 13 00:14:36.720763 kernel: Console: colour dummy device 80x25 May 13 00:14:36.720769 kernel: ACPI: Core revision 20210730 May 13 00:14:36.720776 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 13 00:14:36.720783 kernel: pid_max: default: 32768 minimum: 301 May 13 00:14:36.720789 kernel: LSM: Security Framework initializing May 13 00:14:36.720797 kernel: SELinux: Initializing. May 13 00:14:36.720804 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:14:36.720810 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:14:36.720817 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 13 00:14:36.720823 kernel: rcu: Hierarchical SRCU implementation. May 13 00:14:36.720830 kernel: Platform MSI: ITS@0x8080000 domain created May 13 00:14:36.720836 kernel: PCI/MSI: ITS@0x8080000 domain created May 13 00:14:36.720842 kernel: Remapping and enabling EFI services. May 13 00:14:36.720849 kernel: smp: Bringing up secondary CPUs ... May 13 00:14:36.720856 kernel: Detected PIPT I-cache on CPU1 May 13 00:14:36.720863 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 13 00:14:36.720869 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 13 00:14:36.720876 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:14:36.720883 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 13 00:14:36.720890 kernel: Detected PIPT I-cache on CPU2 May 13 00:14:36.720897 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 13 00:14:36.720904 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 13 00:14:36.720910 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:14:36.720917 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 13 00:14:36.720925 kernel: Detected PIPT I-cache on CPU3 May 13 00:14:36.720932 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 13 00:14:36.720939 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 13 00:14:36.720945 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:14:36.720957 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 13 00:14:36.720965 kernel: smp: Brought up 1 node, 4 CPUs May 13 00:14:36.720971 kernel: SMP: Total of 4 processors activated. May 13 00:14:36.720978 kernel: CPU features: detected: 32-bit EL0 Support May 13 00:14:36.720985 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 13 00:14:36.720992 kernel: CPU features: detected: Common not Private translations May 13 00:14:36.721046 kernel: CPU features: detected: CRC32 instructions May 13 00:14:36.721054 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 13 00:14:36.721063 kernel: CPU features: detected: LSE atomic instructions May 13 00:14:36.721070 kernel: CPU features: detected: Privileged Access Never May 13 00:14:36.721077 kernel: CPU features: detected: RAS Extension Support May 13 00:14:36.721084 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 13 00:14:36.721091 kernel: CPU: All CPU(s) started at EL1 May 13 00:14:36.721099 kernel: alternatives: patching kernel code May 13 00:14:36.721106 kernel: devtmpfs: initialized May 13 00:14:36.721112 kernel: KASLR enabled May 13 00:14:36.721120 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:14:36.721127 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 13 00:14:36.721134 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:14:36.721141 kernel: SMBIOS 3.0.0 present. May 13 00:14:36.721149 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 13 00:14:36.721156 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:14:36.721165 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 13 00:14:36.721172 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 13 00:14:36.721179 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 13 00:14:36.721186 kernel: audit: initializing netlink subsys (disabled) May 13 00:14:36.721193 kernel: audit: type=2000 audit(0.033:1): state=initialized audit_enabled=0 res=1 May 13 00:14:36.721200 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:14:36.721207 kernel: cpuidle: using governor menu May 13 00:14:36.721250 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 13 00:14:36.721258 kernel: ASID allocator initialised with 32768 entries May 13 00:14:36.721266 kernel: ACPI: bus type PCI registered May 13 00:14:36.721273 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:14:36.721280 kernel: Serial: AMBA PL011 UART driver May 13 00:14:36.723612 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:14:36.723634 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 13 00:14:36.723642 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:14:36.723650 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 13 00:14:36.723657 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:14:36.723665 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 13 00:14:36.723677 kernel: ACPI: Added _OSI(Module Device) May 13 00:14:36.723685 kernel: ACPI: Added _OSI(Processor Device) May 13 00:14:36.723692 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:14:36.723699 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:14:36.723706 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:14:36.723713 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:14:36.723720 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:14:36.723728 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:14:36.723734 kernel: ACPI: Interpreter enabled May 13 00:14:36.723743 kernel: ACPI: Using GIC for interrupt routing May 13 00:14:36.723750 kernel: ACPI: MCFG table detected, 1 entries May 13 00:14:36.723757 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 13 00:14:36.723765 kernel: printk: console [ttyAMA0] enabled May 13 00:14:36.723772 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 00:14:36.726000 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:14:36.726079 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 13 00:14:36.726148 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 13 00:14:36.726210 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 13 00:14:36.726301 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 13 00:14:36.726311 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 13 00:14:36.726319 kernel: PCI host bridge to bus 0000:00 May 13 00:14:36.726400 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 13 00:14:36.726460 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 13 00:14:36.726515 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 13 00:14:36.726573 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 00:14:36.726648 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 13 00:14:36.726719 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 13 00:14:36.726783 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 13 00:14:36.726845 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 13 00:14:36.726907 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 13 00:14:36.726970 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 13 00:14:36.727032 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 13 00:14:36.727095 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 13 00:14:36.727150 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 13 00:14:36.727205 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 13 00:14:36.727287 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 13 00:14:36.727297 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 13 00:14:36.727304 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 13 00:14:36.727314 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 13 00:14:36.727321 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 13 00:14:36.727328 kernel: iommu: Default domain type: Translated May 13 00:14:36.727335 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 13 00:14:36.727342 kernel: vgaarb: loaded May 13 00:14:36.727349 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:14:36.727356 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:14:36.727369 kernel: PTP clock support registered May 13 00:14:36.727377 kernel: Registered efivars operations May 13 00:14:36.727386 kernel: clocksource: Switched to clocksource arch_sys_counter May 13 00:14:36.727393 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:14:36.727400 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:14:36.727407 kernel: pnp: PnP ACPI init May 13 00:14:36.727487 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 13 00:14:36.727498 kernel: pnp: PnP ACPI: found 1 devices May 13 00:14:36.727505 kernel: NET: Registered PF_INET protocol family May 13 00:14:36.727512 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 00:14:36.727522 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 00:14:36.727529 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:14:36.727536 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:14:36.727543 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 00:14:36.727550 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 00:14:36.727558 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:14:36.727565 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:14:36.727572 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:14:36.727579 kernel: PCI: CLS 0 bytes, default 64 May 13 00:14:36.727587 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 13 00:14:36.727594 kernel: kvm [1]: HYP mode not available May 13 00:14:36.727601 kernel: Initialise system trusted keyrings May 13 00:14:36.727607 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 00:14:36.727614 kernel: Key type asymmetric registered May 13 00:14:36.727621 kernel: Asymmetric key parser 'x509' registered May 13 00:14:36.727628 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:14:36.727635 kernel: io scheduler mq-deadline registered May 13 00:14:36.727642 kernel: io scheduler kyber registered May 13 00:14:36.727650 kernel: io scheduler bfq registered May 13 00:14:36.727657 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 13 00:14:36.727664 kernel: ACPI: button: Power Button [PWRB] May 13 00:14:36.727672 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 13 00:14:36.727735 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 13 00:14:36.727744 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:14:36.727751 kernel: thunder_xcv, ver 1.0 May 13 00:14:36.727758 kernel: thunder_bgx, ver 1.0 May 13 00:14:36.727765 kernel: nicpf, ver 1.0 May 13 00:14:36.727774 kernel: nicvf, ver 1.0 May 13 00:14:36.727842 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 13 00:14:36.727900 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-13T00:14:36 UTC (1747095276) May 13 00:14:36.727909 kernel: hid: raw HID events driver (C) Jiri Kosina May 13 00:14:36.727916 kernel: NET: Registered PF_INET6 protocol family May 13 00:14:36.727923 kernel: Segment Routing with IPv6 May 13 00:14:36.727930 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:14:36.727937 kernel: NET: Registered PF_PACKET protocol family May 13 00:14:36.727946 kernel: Key type dns_resolver registered May 13 00:14:36.727953 kernel: registered taskstats version 1 May 13 00:14:36.727960 kernel: Loading compiled-in X.509 certificates May 13 00:14:36.727968 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: d291b704d59536a3c0ba96fd6f5a99459de8de99' May 13 00:14:36.727975 kernel: Key type .fscrypt registered May 13 00:14:36.727981 kernel: Key type fscrypt-provisioning registered May 13 00:14:36.727988 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:14:36.727995 kernel: ima: Allocated hash algorithm: sha1 May 13 00:14:36.728002 kernel: ima: No architecture policies found May 13 00:14:36.728011 kernel: clk: Disabling unused clocks May 13 00:14:36.728018 kernel: Freeing unused kernel memory: 36480K May 13 00:14:36.728024 kernel: Run /init as init process May 13 00:14:36.728031 kernel: with arguments: May 13 00:14:36.728039 kernel: /init May 13 00:14:36.728045 kernel: with environment: May 13 00:14:36.728052 kernel: HOME=/ May 13 00:14:36.728059 kernel: TERM=linux May 13 00:14:36.728065 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:14:36.728076 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:14:36.728085 systemd[1]: Detected virtualization kvm. May 13 00:14:36.728093 systemd[1]: Detected architecture arm64. May 13 00:14:36.728100 systemd[1]: Running in initrd. May 13 00:14:36.728107 systemd[1]: No hostname configured, using default hostname. May 13 00:14:36.728114 systemd[1]: Hostname set to . May 13 00:14:36.728122 systemd[1]: Initializing machine ID from VM UUID. May 13 00:14:36.728130 systemd[1]: Queued start job for default target initrd.target. May 13 00:14:36.728138 systemd[1]: Started systemd-ask-password-console.path. May 13 00:14:36.728145 systemd[1]: Reached target cryptsetup.target. May 13 00:14:36.728152 systemd[1]: Reached target paths.target. May 13 00:14:36.728160 systemd[1]: Reached target slices.target. May 13 00:14:36.728167 systemd[1]: Reached target swap.target. May 13 00:14:36.728174 systemd[1]: Reached target timers.target. May 13 00:14:36.728182 systemd[1]: Listening on iscsid.socket. May 13 00:14:36.728190 systemd[1]: Listening on iscsiuio.socket. May 13 00:14:36.728198 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:14:36.728205 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:14:36.728223 systemd[1]: Listening on systemd-journald.socket. May 13 00:14:36.728233 systemd[1]: Listening on systemd-networkd.socket. May 13 00:14:36.728241 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:14:36.728249 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:14:36.728256 systemd[1]: Reached target sockets.target. May 13 00:14:36.728265 systemd[1]: Starting kmod-static-nodes.service... May 13 00:14:36.728272 systemd[1]: Finished network-cleanup.service. May 13 00:14:36.728280 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:14:36.728287 systemd[1]: Starting systemd-journald.service... May 13 00:14:36.728294 systemd[1]: Starting systemd-modules-load.service... May 13 00:14:36.728302 systemd[1]: Starting systemd-resolved.service... May 13 00:14:36.728309 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:14:36.728317 systemd[1]: Finished kmod-static-nodes.service. May 13 00:14:36.728324 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:14:36.728333 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:14:36.728340 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:14:36.728348 kernel: audit: type=1130 audit(1747095276.718:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.728356 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:14:36.728371 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:14:36.728379 kernel: audit: type=1130 audit(1747095276.723:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.728391 systemd-journald[290]: Journal started May 13 00:14:36.728440 systemd-journald[290]: Runtime Journal (/run/log/journal/e016f2a05dfb40e6a60c02addaadc011) is 6.0M, max 48.7M, 42.6M free. May 13 00:14:36.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.714790 systemd-modules-load[291]: Inserted module 'overlay' May 13 00:14:36.729918 systemd[1]: Started systemd-journald.service. May 13 00:14:36.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.733256 kernel: audit: type=1130 audit(1747095276.730:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.738233 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:14:36.739327 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:14:36.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.741695 systemd[1]: Starting dracut-cmdline.service... May 13 00:14:36.745652 kernel: audit: type=1130 audit(1747095276.739:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.745672 kernel: Bridge firewalling registered May 13 00:14:36.742754 systemd-modules-load[291]: Inserted module 'br_netfilter' May 13 00:14:36.746179 systemd-resolved[292]: Positive Trust Anchors: May 13 00:14:36.746186 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:14:36.746232 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:14:36.750450 systemd-resolved[292]: Defaulting to hostname 'linux'. May 13 00:14:36.755454 kernel: audit: type=1130 audit(1747095276.752:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.755475 kernel: SCSI subsystem initialized May 13 00:14:36.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.751232 systemd[1]: Started systemd-resolved.service. May 13 00:14:36.752688 systemd[1]: Reached target nss-lookup.target. May 13 00:14:36.762822 dracut-cmdline[310]: dracut-dracut-053 May 13 00:14:36.764527 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:14:36.764547 kernel: device-mapper: uevent: version 1.0.3 May 13 00:14:36.764556 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:14:36.765475 dracut-cmdline[310]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=ae60136413c5686d5b1e9c38408a367f831e354d706496e9f743f02289aad53d May 13 00:14:36.769061 systemd-modules-load[291]: Inserted module 'dm_multipath' May 13 00:14:36.769913 systemd[1]: Finished systemd-modules-load.service. May 13 00:14:36.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.772118 systemd[1]: Starting systemd-sysctl.service... May 13 00:14:36.774834 kernel: audit: type=1130 audit(1747095276.770:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.780045 systemd[1]: Finished systemd-sysctl.service. May 13 00:14:36.783250 kernel: audit: type=1130 audit(1747095276.780:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.835248 kernel: Loading iSCSI transport class v2.0-870. May 13 00:14:36.859270 kernel: iscsi: registered transport (tcp) May 13 00:14:36.880485 kernel: iscsi: registered transport (qla4xxx) May 13 00:14:36.880567 kernel: QLogic iSCSI HBA Driver May 13 00:14:36.923665 systemd[1]: Finished dracut-cmdline.service. May 13 00:14:36.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.925240 systemd[1]: Starting dracut-pre-udev.service... May 13 00:14:36.927811 kernel: audit: type=1130 audit(1747095276.924:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:36.972249 kernel: raid6: neonx8 gen() 13614 MB/s May 13 00:14:36.989253 kernel: raid6: neonx8 xor() 8095 MB/s May 13 00:14:37.006239 kernel: raid6: neonx4 gen() 7571 MB/s May 13 00:14:37.023232 kernel: raid6: neonx4 xor() 10037 MB/s May 13 00:14:37.040233 kernel: raid6: neonx2 gen() 12895 MB/s May 13 00:14:37.057232 kernel: raid6: neonx2 xor() 10363 MB/s May 13 00:14:37.074231 kernel: raid6: neonx1 gen() 10587 MB/s May 13 00:14:37.091239 kernel: raid6: neonx1 xor() 8339 MB/s May 13 00:14:37.108235 kernel: raid6: int64x8 gen() 4535 MB/s May 13 00:14:37.125233 kernel: raid6: int64x8 xor() 3372 MB/s May 13 00:14:37.142236 kernel: raid6: int64x4 gen() 6284 MB/s May 13 00:14:37.159238 kernel: raid6: int64x4 xor() 3358 MB/s May 13 00:14:37.176234 kernel: raid6: int64x2 gen() 5991 MB/s May 13 00:14:37.193229 kernel: raid6: int64x2 xor() 3273 MB/s May 13 00:14:37.210236 kernel: raid6: int64x1 gen() 4850 MB/s May 13 00:14:37.227445 kernel: raid6: int64x1 xor() 2644 MB/s May 13 00:14:37.227462 kernel: raid6: using algorithm neonx8 gen() 13614 MB/s May 13 00:14:37.227471 kernel: raid6: .... xor() 8095 MB/s, rmw enabled May 13 00:14:37.227480 kernel: raid6: using neon recovery algorithm May 13 00:14:37.238248 kernel: xor: measuring software checksum speed May 13 00:14:37.238267 kernel: 8regs : 17227 MB/sec May 13 00:14:37.239267 kernel: 32regs : 20332 MB/sec May 13 00:14:37.239284 kernel: arm64_neon : 27561 MB/sec May 13 00:14:37.239293 kernel: xor: using function: arm64_neon (27561 MB/sec) May 13 00:14:37.301241 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 13 00:14:37.315385 systemd[1]: Finished dracut-pre-udev.service. May 13 00:14:37.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:37.318000 audit: BPF prog-id=7 op=LOAD May 13 00:14:37.318000 audit: BPF prog-id=8 op=LOAD May 13 00:14:37.319076 systemd[1]: Starting systemd-udevd.service... May 13 00:14:37.320201 kernel: audit: type=1130 audit(1747095277.315:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:37.342287 systemd-udevd[493]: Using default interface naming scheme 'v252'. May 13 00:14:37.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:37.345674 systemd[1]: Started systemd-udevd.service. May 13 00:14:37.347079 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:14:37.364681 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation May 13 00:14:37.392415 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:14:37.394010 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:14:37.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:37.428278 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:14:37.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:37.457437 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 13 00:14:37.461803 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 00:14:37.461819 kernel: GPT:9289727 != 19775487 May 13 00:14:37.461828 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 00:14:37.461837 kernel: GPT:9289727 != 19775487 May 13 00:14:37.461852 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 00:14:37.461861 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:14:37.474737 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:14:37.478240 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (548) May 13 00:14:37.481210 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:14:37.482076 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:14:37.488363 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:14:37.492226 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:14:37.494476 systemd[1]: Starting disk-uuid.service... May 13 00:14:37.500444 disk-uuid[562]: Primary Header is updated. May 13 00:14:37.500444 disk-uuid[562]: Secondary Entries is updated. May 13 00:14:37.500444 disk-uuid[562]: Secondary Header is updated. May 13 00:14:37.503233 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:14:38.516195 disk-uuid[563]: The operation has completed successfully. May 13 00:14:38.517040 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:14:38.549782 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:14:38.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.549905 systemd[1]: Finished disk-uuid.service. May 13 00:14:38.551646 systemd[1]: Starting verity-setup.service... May 13 00:14:38.572242 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 13 00:14:38.601552 systemd[1]: Found device dev-mapper-usr.device. May 13 00:14:38.604029 systemd[1]: Mounting sysusr-usr.mount... May 13 00:14:38.605935 systemd[1]: Finished verity-setup.service. May 13 00:14:38.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.654898 systemd[1]: Mounted sysusr-usr.mount. May 13 00:14:38.656170 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:14:38.655820 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 00:14:38.656645 systemd[1]: Starting ignition-setup.service... May 13 00:14:38.658727 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:14:38.666245 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 13 00:14:38.666302 kernel: BTRFS info (device vda6): using free space tree May 13 00:14:38.666313 kernel: BTRFS info (device vda6): has skinny extents May 13 00:14:38.675885 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:14:38.682912 systemd[1]: Finished ignition-setup.service. May 13 00:14:38.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.684678 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:14:38.755853 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:14:38.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.757000 audit: BPF prog-id=9 op=LOAD May 13 00:14:38.758671 systemd[1]: Starting systemd-networkd.service... May 13 00:14:38.775854 ignition[644]: Ignition 2.14.0 May 13 00:14:38.775864 ignition[644]: Stage: fetch-offline May 13 00:14:38.775904 ignition[644]: no configs at "/usr/lib/ignition/base.d" May 13 00:14:38.775913 ignition[644]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:14:38.776048 ignition[644]: parsed url from cmdline: "" May 13 00:14:38.776051 ignition[644]: no config URL provided May 13 00:14:38.776056 ignition[644]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:14:38.776063 ignition[644]: no config at "/usr/lib/ignition/user.ign" May 13 00:14:38.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.776082 ignition[644]: op(1): [started] loading QEMU firmware config module May 13 00:14:38.782435 systemd-networkd[735]: lo: Link UP May 13 00:14:38.776087 ignition[644]: op(1): executing: "modprobe" "qemu_fw_cfg" May 13 00:14:38.782439 systemd-networkd[735]: lo: Gained carrier May 13 00:14:38.782245 ignition[644]: op(1): [finished] loading QEMU firmware config module May 13 00:14:38.782805 systemd-networkd[735]: Enumeration completed May 13 00:14:38.782993 systemd-networkd[735]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:14:38.783142 systemd[1]: Started systemd-networkd.service. May 13 00:14:38.783984 systemd-networkd[735]: eth0: Link UP May 13 00:14:38.783987 systemd-networkd[735]: eth0: Gained carrier May 13 00:14:38.784474 systemd[1]: Reached target network.target. May 13 00:14:38.786148 systemd[1]: Starting iscsiuio.service... May 13 00:14:38.795361 systemd[1]: Started iscsiuio.service. May 13 00:14:38.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.797047 systemd[1]: Starting iscsid.service... May 13 00:14:38.800298 systemd-networkd[735]: eth0: DHCPv4 address 10.0.0.7/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:14:38.801276 iscsid[743]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:14:38.801276 iscsid[743]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:14:38.801276 iscsid[743]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:14:38.801276 iscsid[743]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:14:38.801276 iscsid[743]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:14:38.801276 iscsid[743]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:14:38.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.803583 systemd[1]: Started iscsid.service. May 13 00:14:38.808365 systemd[1]: Starting dracut-initqueue.service... May 13 00:14:38.819464 systemd[1]: Finished dracut-initqueue.service. May 13 00:14:38.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.820576 systemd[1]: Reached target remote-fs-pre.target. May 13 00:14:38.821970 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:14:38.823539 systemd[1]: Reached target remote-fs.target. May 13 00:14:38.826021 systemd[1]: Starting dracut-pre-mount.service... May 13 00:14:38.834329 systemd[1]: Finished dracut-pre-mount.service. May 13 00:14:38.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.848192 ignition[644]: parsing config with SHA512: 3cae92ff32ab1348d659379f41662910cc4123fdecd2c19d0156b7a2b46f669e9a75f116bb5297639e32663c463a1d52550452c76e8fc5bee3f449a70633b593 May 13 00:14:38.860076 unknown[644]: fetched base config from "system" May 13 00:14:38.860088 unknown[644]: fetched user config from "qemu" May 13 00:14:38.860584 ignition[644]: fetch-offline: fetch-offline passed May 13 00:14:38.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.861536 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:14:38.860647 ignition[644]: Ignition finished successfully May 13 00:14:38.862741 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:14:38.863638 systemd[1]: Starting ignition-kargs.service... May 13 00:14:38.873815 ignition[757]: Ignition 2.14.0 May 13 00:14:38.873835 ignition[757]: Stage: kargs May 13 00:14:38.873949 ignition[757]: no configs at "/usr/lib/ignition/base.d" May 13 00:14:38.876235 systemd[1]: Finished ignition-kargs.service. May 13 00:14:38.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.873961 ignition[757]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:14:38.874873 ignition[757]: kargs: kargs passed May 13 00:14:38.878711 systemd[1]: Starting ignition-disks.service... May 13 00:14:38.874920 ignition[757]: Ignition finished successfully May 13 00:14:38.886540 ignition[763]: Ignition 2.14.0 May 13 00:14:38.886553 ignition[763]: Stage: disks May 13 00:14:38.886673 ignition[763]: no configs at "/usr/lib/ignition/base.d" May 13 00:14:38.888735 systemd[1]: Finished ignition-disks.service. May 13 00:14:38.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.886683 ignition[763]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:14:38.890392 systemd[1]: Reached target initrd-root-device.target. May 13 00:14:38.887732 ignition[763]: disks: disks passed May 13 00:14:38.891781 systemd[1]: Reached target local-fs-pre.target. May 13 00:14:38.887781 ignition[763]: Ignition finished successfully May 13 00:14:38.893437 systemd[1]: Reached target local-fs.target. May 13 00:14:38.894898 systemd[1]: Reached target sysinit.target. May 13 00:14:38.896145 systemd[1]: Reached target basic.target. May 13 00:14:38.898581 systemd[1]: Starting systemd-fsck-root.service... May 13 00:14:38.910494 systemd-fsck[771]: ROOT: clean, 619/553520 files, 56022/553472 blocks May 13 00:14:38.916482 systemd[1]: Finished systemd-fsck-root.service. May 13 00:14:38.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.918387 systemd[1]: Mounting sysroot.mount... May 13 00:14:38.925243 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:14:38.925797 systemd[1]: Mounted sysroot.mount. May 13 00:14:38.926620 systemd[1]: Reached target initrd-root-fs.target. May 13 00:14:38.929636 systemd[1]: Mounting sysroot-usr.mount... May 13 00:14:38.930555 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:14:38.930605 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:14:38.930630 systemd[1]: Reached target ignition-diskful.target. May 13 00:14:38.932758 systemd[1]: Mounted sysroot-usr.mount. May 13 00:14:38.934656 systemd[1]: Starting initrd-setup-root.service... May 13 00:14:38.939492 initrd-setup-root[781]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:14:38.948246 initrd-setup-root[789]: cut: /sysroot/etc/group: No such file or directory May 13 00:14:38.953403 initrd-setup-root[797]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:14:38.956826 initrd-setup-root[805]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:14:38.989017 systemd[1]: Finished initrd-setup-root.service. May 13 00:14:38.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:38.990884 systemd[1]: Starting ignition-mount.service... May 13 00:14:38.992422 systemd[1]: Starting sysroot-boot.service... May 13 00:14:39.001021 bash[823]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:14:39.010640 ignition[824]: INFO : Ignition 2.14.0 May 13 00:14:39.010640 ignition[824]: INFO : Stage: mount May 13 00:14:39.011964 ignition[824]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:14:39.011964 ignition[824]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:14:39.011964 ignition[824]: INFO : mount: mount passed May 13 00:14:39.011964 ignition[824]: INFO : Ignition finished successfully May 13 00:14:39.014484 systemd[1]: Finished ignition-mount.service. May 13 00:14:39.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:39.016414 systemd[1]: Finished sysroot-boot.service. May 13 00:14:39.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:39.613075 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:14:39.619341 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (833) May 13 00:14:39.620647 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 13 00:14:39.620670 kernel: BTRFS info (device vda6): using free space tree May 13 00:14:39.620681 kernel: BTRFS info (device vda6): has skinny extents May 13 00:14:39.624183 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:14:39.625721 systemd[1]: Starting ignition-files.service... May 13 00:14:39.642197 ignition[853]: INFO : Ignition 2.14.0 May 13 00:14:39.642197 ignition[853]: INFO : Stage: files May 13 00:14:39.643511 ignition[853]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:14:39.643511 ignition[853]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:14:39.643511 ignition[853]: DEBUG : files: compiled without relabeling support, skipping May 13 00:14:39.659995 ignition[853]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:14:39.659995 ignition[853]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:14:39.663802 ignition[853]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:14:39.664884 ignition[853]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:14:39.666066 unknown[853]: wrote ssh authorized keys file for user: core May 13 00:14:39.667121 ignition[853]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:14:39.667121 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 13 00:14:39.667121 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 May 13 00:14:39.756910 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 13 00:14:39.971164 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 13 00:14:39.971164 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 13 00:14:39.974557 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-arm64.raw: attempt #1 May 13 00:14:40.184366 systemd-networkd[735]: eth0: Gained IPv6LL May 13 00:14:40.339416 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 13 00:14:40.726657 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 13 00:14:40.726657 ignition[853]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 13 00:14:40.730017 ignition[853]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:14:40.730017 ignition[853]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:14:40.730017 ignition[853]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 13 00:14:40.730017 ignition[853]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 13 00:14:40.730017 ignition[853]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:14:40.730017 ignition[853]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:14:40.730017 ignition[853]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 13 00:14:40.730017 ignition[853]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 13 00:14:40.730017 ignition[853]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 13 00:14:40.730017 ignition[853]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:14:40.730017 ignition[853]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:14:40.778231 ignition[853]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:14:40.780350 ignition[853]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:14:40.780350 ignition[853]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:14:40.780350 ignition[853]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:14:40.780350 ignition[853]: INFO : files: files passed May 13 00:14:40.780350 ignition[853]: INFO : Ignition finished successfully May 13 00:14:40.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.781856 systemd[1]: Finished ignition-files.service. May 13 00:14:40.787516 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:14:40.788658 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:14:40.789392 systemd[1]: Starting ignition-quench.service... May 13 00:14:40.798521 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:14:40.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.798639 systemd[1]: Finished ignition-quench.service. May 13 00:14:40.800647 initrd-setup-root-after-ignition[878]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 13 00:14:40.803633 initrd-setup-root-after-ignition[880]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:14:40.804379 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:14:40.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.806379 systemd[1]: Reached target ignition-complete.target. May 13 00:14:40.807863 systemd[1]: Starting initrd-parse-etc.service... May 13 00:14:40.821151 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:14:40.821261 systemd[1]: Finished initrd-parse-etc.service. May 13 00:14:40.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.822628 systemd[1]: Reached target initrd-fs.target. May 13 00:14:40.823674 systemd[1]: Reached target initrd.target. May 13 00:14:40.824829 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:14:40.825709 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:14:40.836002 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:14:40.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.837565 systemd[1]: Starting initrd-cleanup.service... May 13 00:14:40.845916 systemd[1]: Stopped target nss-lookup.target. May 13 00:14:40.846781 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:14:40.847947 systemd[1]: Stopped target timers.target. May 13 00:14:40.849084 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:14:40.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.849198 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:14:40.850293 systemd[1]: Stopped target initrd.target. May 13 00:14:40.851381 systemd[1]: Stopped target basic.target. May 13 00:14:40.852417 systemd[1]: Stopped target ignition-complete.target. May 13 00:14:40.853506 systemd[1]: Stopped target ignition-diskful.target. May 13 00:14:40.854657 systemd[1]: Stopped target initrd-root-device.target. May 13 00:14:40.855849 systemd[1]: Stopped target remote-fs.target. May 13 00:14:40.857021 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:14:40.858179 systemd[1]: Stopped target sysinit.target. May 13 00:14:40.858934 systemd[1]: Stopped target local-fs.target. May 13 00:14:40.860976 systemd[1]: Stopped target local-fs-pre.target. May 13 00:14:40.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.862141 systemd[1]: Stopped target swap.target. May 13 00:14:40.863126 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:14:40.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.863261 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:14:40.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.864259 systemd[1]: Stopped target cryptsetup.target. May 13 00:14:40.865157 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:14:40.865262 systemd[1]: Stopped dracut-initqueue.service. May 13 00:14:40.866273 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:14:40.866376 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:14:40.867625 systemd[1]: Stopped target paths.target. May 13 00:14:40.868524 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:14:40.874253 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:14:40.875024 systemd[1]: Stopped target slices.target. May 13 00:14:40.876118 systemd[1]: Stopped target sockets.target. May 13 00:14:40.877087 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:14:40.877165 systemd[1]: Closed iscsid.socket. May 13 00:14:40.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.878020 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:14:40.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.878120 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:14:40.879243 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:14:40.879333 systemd[1]: Stopped ignition-files.service. May 13 00:14:40.881030 systemd[1]: Stopping ignition-mount.service... May 13 00:14:40.882168 systemd[1]: Stopping iscsiuio.service... May 13 00:14:40.884442 systemd[1]: Stopping sysroot-boot.service... May 13 00:14:40.885273 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:14:40.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.885576 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:14:40.886577 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:14:40.886702 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:14:40.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.889463 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:14:40.889571 systemd[1]: Stopped iscsiuio.service. May 13 00:14:40.893108 ignition[893]: INFO : Ignition 2.14.0 May 13 00:14:40.893108 ignition[893]: INFO : Stage: umount May 13 00:14:40.893108 ignition[893]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:14:40.893108 ignition[893]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:14:40.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.890916 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:14:40.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.901079 ignition[893]: INFO : umount: umount passed May 13 00:14:40.901079 ignition[893]: INFO : Ignition finished successfully May 13 00:14:40.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.891022 systemd[1]: Closed iscsiuio.socket. May 13 00:14:40.892796 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:14:40.892930 systemd[1]: Finished initrd-cleanup.service. May 13 00:14:40.896120 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:14:40.896546 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:14:40.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.896627 systemd[1]: Stopped ignition-mount.service. May 13 00:14:40.897979 systemd[1]: Stopped target network.target. May 13 00:14:40.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.915000 audit: BPF prog-id=6 op=UNLOAD May 13 00:14:40.899814 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:14:40.899871 systemd[1]: Stopped ignition-disks.service. May 13 00:14:40.900480 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:14:40.900523 systemd[1]: Stopped ignition-kargs.service. May 13 00:14:40.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.901605 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:14:40.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.901653 systemd[1]: Stopped ignition-setup.service. May 13 00:14:40.902816 systemd[1]: Stopping systemd-networkd.service... May 13 00:14:40.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.904231 systemd[1]: Stopping systemd-resolved.service... May 13 00:14:40.909484 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:14:40.909589 systemd[1]: Stopped systemd-resolved.service. May 13 00:14:40.911309 systemd-networkd[735]: eth0: DHCPv6 lease lost May 13 00:14:40.929000 audit: BPF prog-id=9 op=UNLOAD May 13 00:14:40.912565 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:14:40.912656 systemd[1]: Stopped systemd-networkd.service. May 13 00:14:40.915410 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:14:40.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.915446 systemd[1]: Closed systemd-networkd.socket. May 13 00:14:40.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.917358 systemd[1]: Stopping network-cleanup.service... May 13 00:14:40.918512 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:14:40.918578 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:14:40.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.920081 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:14:40.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.920141 systemd[1]: Stopped systemd-sysctl.service. May 13 00:14:40.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.922005 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:14:40.922046 systemd[1]: Stopped systemd-modules-load.service. May 13 00:14:40.923686 systemd[1]: Stopping systemd-udevd.service... May 13 00:14:40.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.928638 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:14:40.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.931400 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:14:40.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.931532 systemd[1]: Stopped network-cleanup.service. May 13 00:14:40.933564 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:14:40.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.933689 systemd[1]: Stopped systemd-udevd.service. May 13 00:14:40.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.935083 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:14:40.935118 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:14:40.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:40.936065 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:14:40.936095 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:14:40.937754 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:14:40.937828 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:14:40.938805 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:14:40.938854 systemd[1]: Stopped dracut-cmdline.service. May 13 00:14:40.940072 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:14:40.940113 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:14:40.942159 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:14:40.943543 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 13 00:14:40.943608 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 13 00:14:40.945478 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:14:40.945515 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:14:40.946383 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:14:40.946419 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:14:40.948894 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 13 00:14:40.949361 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:14:40.949450 systemd[1]: Stopped sysroot-boot.service. May 13 00:14:40.950481 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:14:40.950554 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:14:40.952067 systemd[1]: Reached target initrd-switch-root.target. May 13 00:14:40.953193 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:14:40.953262 systemd[1]: Stopped initrd-setup-root.service. May 13 00:14:40.955664 systemd[1]: Starting initrd-switch-root.service... May 13 00:14:40.962812 systemd[1]: Switching root. May 13 00:14:40.982681 iscsid[743]: iscsid shutting down. May 13 00:14:40.983203 systemd-journald[290]: Journal stopped May 13 00:14:43.058532 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). May 13 00:14:43.059130 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:14:43.059154 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:14:43.059165 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:14:43.059176 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:14:43.059185 kernel: SELinux: policy capability open_perms=1 May 13 00:14:43.059196 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:14:43.059206 kernel: SELinux: policy capability always_check_network=0 May 13 00:14:43.059245 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:14:43.059256 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:14:43.059266 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:14:43.059276 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:14:43.059286 kernel: kauditd_printk_skb: 64 callbacks suppressed May 13 00:14:43.059302 kernel: audit: type=1403 audit(1747095281.047:75): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:14:43.059313 systemd[1]: Successfully loaded SELinux policy in 35.725ms. May 13 00:14:43.059340 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.485ms. May 13 00:14:43.059356 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:14:43.059367 systemd[1]: Detected virtualization kvm. May 13 00:14:43.059378 systemd[1]: Detected architecture arm64. May 13 00:14:43.059388 systemd[1]: Detected first boot. May 13 00:14:43.059399 systemd[1]: Initializing machine ID from VM UUID. May 13 00:14:43.059410 kernel: audit: type=1400 audit(1747095281.132:76): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:14:43.059423 kernel: audit: type=1400 audit(1747095281.132:77): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:14:43.059439 kernel: audit: type=1334 audit(1747095281.134:78): prog-id=10 op=LOAD May 13 00:14:43.059449 kernel: audit: type=1334 audit(1747095281.134:79): prog-id=10 op=UNLOAD May 13 00:14:43.059459 kernel: audit: type=1334 audit(1747095281.136:80): prog-id=11 op=LOAD May 13 00:14:43.059469 kernel: audit: type=1334 audit(1747095281.136:81): prog-id=11 op=UNLOAD May 13 00:14:43.059480 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:14:43.059492 kernel: audit: type=1400 audit(1747095281.190:82): avc: denied { associate } for pid=927 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:14:43.059503 kernel: audit: type=1300 audit(1747095281.190:82): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:43.059516 kernel: audit: type=1327 audit(1747095281.190:82): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:14:43.059527 systemd[1]: Populated /etc with preset unit settings. May 13 00:14:43.059538 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:14:43.059551 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:14:43.059564 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:14:43.059584 systemd[1]: iscsid.service: Deactivated successfully. May 13 00:14:43.059602 systemd[1]: Stopped iscsid.service. May 13 00:14:43.059613 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 00:14:43.059623 systemd[1]: Stopped initrd-switch-root.service. May 13 00:14:43.059635 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 00:14:43.059646 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:14:43.059657 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:14:43.059668 systemd[1]: Created slice system-getty.slice. May 13 00:14:43.059680 systemd[1]: Created slice system-modprobe.slice. May 13 00:14:43.059691 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:14:43.059702 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:14:43.059713 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:14:43.059724 systemd[1]: Created slice user.slice. May 13 00:14:43.059734 systemd[1]: Started systemd-ask-password-console.path. May 13 00:14:43.059745 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:14:43.059755 systemd[1]: Set up automount boot.automount. May 13 00:14:43.059766 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:14:43.059778 systemd[1]: Stopped target initrd-switch-root.target. May 13 00:14:43.059789 systemd[1]: Stopped target initrd-fs.target. May 13 00:14:43.059800 systemd[1]: Stopped target initrd-root-fs.target. May 13 00:14:43.059812 systemd[1]: Reached target integritysetup.target. May 13 00:14:43.059823 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:14:43.059833 systemd[1]: Reached target remote-fs.target. May 13 00:14:43.059844 systemd[1]: Reached target slices.target. May 13 00:14:43.059855 systemd[1]: Reached target swap.target. May 13 00:14:43.059865 systemd[1]: Reached target torcx.target. May 13 00:14:43.059876 systemd[1]: Reached target veritysetup.target. May 13 00:14:43.059889 systemd[1]: Listening on systemd-coredump.socket. May 13 00:14:43.059901 systemd[1]: Listening on systemd-initctl.socket. May 13 00:14:43.059912 systemd[1]: Listening on systemd-networkd.socket. May 13 00:14:43.059922 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:14:43.059933 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:14:43.059944 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:14:43.059955 systemd[1]: Mounting dev-hugepages.mount... May 13 00:14:43.059965 systemd[1]: Mounting dev-mqueue.mount... May 13 00:14:43.059976 systemd[1]: Mounting media.mount... May 13 00:14:43.059989 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:14:43.060000 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:14:43.060010 systemd[1]: Mounting tmp.mount... May 13 00:14:43.060021 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:14:43.060032 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:14:43.060044 systemd[1]: Starting kmod-static-nodes.service... May 13 00:14:43.060054 systemd[1]: Starting modprobe@configfs.service... May 13 00:14:43.060066 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:14:43.060076 systemd[1]: Starting modprobe@drm.service... May 13 00:14:43.060089 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:14:43.060100 systemd[1]: Starting modprobe@fuse.service... May 13 00:14:43.060111 systemd[1]: Starting modprobe@loop.service... May 13 00:14:43.060121 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:14:43.060132 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 00:14:43.060142 systemd[1]: Stopped systemd-fsck-root.service. May 13 00:14:43.060153 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 00:14:43.060163 systemd[1]: Stopped systemd-fsck-usr.service. May 13 00:14:43.060174 systemd[1]: Stopped systemd-journald.service. May 13 00:14:43.060186 systemd[1]: Starting systemd-journald.service... May 13 00:14:43.060196 kernel: fuse: init (API version 7.34) May 13 00:14:43.060206 systemd[1]: Starting systemd-modules-load.service... May 13 00:14:43.060259 systemd[1]: Starting systemd-network-generator.service... May 13 00:14:43.060271 systemd[1]: Starting systemd-remount-fs.service... May 13 00:14:43.060282 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:14:43.060292 systemd[1]: verity-setup.service: Deactivated successfully. May 13 00:14:43.060303 systemd[1]: Stopped verity-setup.service. May 13 00:14:43.060314 systemd[1]: Mounted dev-hugepages.mount. May 13 00:14:43.060324 kernel: loop: module loaded May 13 00:14:43.060652 systemd[1]: Mounted dev-mqueue.mount. May 13 00:14:43.060673 systemd[1]: Mounted media.mount. May 13 00:14:43.060684 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:14:43.060694 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:14:43.060706 systemd[1]: Mounted tmp.mount. May 13 00:14:43.060717 systemd[1]: Finished kmod-static-nodes.service. May 13 00:14:43.060727 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:14:43.060738 systemd[1]: Finished modprobe@configfs.service. May 13 00:14:43.060749 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:14:43.060764 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:14:43.060774 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:14:43.060785 systemd[1]: Finished modprobe@drm.service. May 13 00:14:43.060795 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:14:43.060805 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:14:43.060817 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:14:43.060827 systemd[1]: Finished modprobe@fuse.service. May 13 00:14:43.060838 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:14:43.060849 systemd[1]: Finished modprobe@loop.service. May 13 00:14:43.060860 systemd[1]: Finished systemd-modules-load.service. May 13 00:14:43.060871 systemd[1]: Finished systemd-network-generator.service. May 13 00:14:43.060883 systemd[1]: Finished systemd-remount-fs.service. May 13 00:14:43.060894 systemd[1]: Reached target network-pre.target. May 13 00:14:43.060904 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:14:43.060918 systemd-journald[989]: Journal started May 13 00:14:43.060977 systemd-journald[989]: Runtime Journal (/run/log/journal/e016f2a05dfb40e6a60c02addaadc011) is 6.0M, max 48.7M, 42.6M free. May 13 00:14:43.061015 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:14:41.047000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:14:41.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:14:41.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:14:41.134000 audit: BPF prog-id=10 op=LOAD May 13 00:14:41.134000 audit: BPF prog-id=10 op=UNLOAD May 13 00:14:41.136000 audit: BPF prog-id=11 op=LOAD May 13 00:14:41.136000 audit: BPF prog-id=11 op=UNLOAD May 13 00:14:41.190000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:14:41.190000 audit[927]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:41.190000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:14:41.191000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:14:41.191000 audit[927]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5975 a2=1ed a3=0 items=2 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:41.191000 audit: CWD cwd="/" May 13 00:14:41.191000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:14:41.191000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:14:41.191000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:14:42.906000 audit: BPF prog-id=12 op=LOAD May 13 00:14:42.906000 audit: BPF prog-id=3 op=UNLOAD May 13 00:14:42.906000 audit: BPF prog-id=13 op=LOAD May 13 00:14:42.906000 audit: BPF prog-id=14 op=LOAD May 13 00:14:42.906000 audit: BPF prog-id=4 op=UNLOAD May 13 00:14:42.906000 audit: BPF prog-id=5 op=UNLOAD May 13 00:14:42.907000 audit: BPF prog-id=15 op=LOAD May 13 00:14:42.907000 audit: BPF prog-id=12 op=UNLOAD May 13 00:14:42.907000 audit: BPF prog-id=16 op=LOAD May 13 00:14:42.907000 audit: BPF prog-id=17 op=LOAD May 13 00:14:42.907000 audit: BPF prog-id=13 op=UNLOAD May 13 00:14:42.907000 audit: BPF prog-id=14 op=UNLOAD May 13 00:14:42.907000 audit: BPF prog-id=18 op=LOAD May 13 00:14:42.907000 audit: BPF prog-id=15 op=UNLOAD May 13 00:14:42.907000 audit: BPF prog-id=19 op=LOAD May 13 00:14:42.907000 audit: BPF prog-id=20 op=LOAD May 13 00:14:42.907000 audit: BPF prog-id=16 op=UNLOAD May 13 00:14:42.907000 audit: BPF prog-id=17 op=UNLOAD May 13 00:14:42.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:42.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:42.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:42.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:42.915000 audit: BPF prog-id=18 op=UNLOAD May 13 00:14:43.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.012000 audit: BPF prog-id=21 op=LOAD May 13 00:14:43.012000 audit: BPF prog-id=22 op=LOAD May 13 00:14:43.012000 audit: BPF prog-id=23 op=LOAD May 13 00:14:43.012000 audit: BPF prog-id=19 op=UNLOAD May 13 00:14:43.012000 audit: BPF prog-id=20 op=UNLOAD May 13 00:14:43.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.053000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:14:43.053000 audit[989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffeb114730 a2=4000 a3=1 items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:43.053000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:14:43.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:41.186395 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:14:42.904583 systemd[1]: Queued start job for default target multi-user.target. May 13 00:14:41.186668 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:14:42.904596 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 00:14:41.186688 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:14:42.908277 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 00:14:41.186718 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 00:14:41.186728 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 00:14:41.186756 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 00:14:41.186769 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 00:14:43.063190 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:14:41.187092 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 00:14:41.187128 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:14:41.187140 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:14:41.188426 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 00:14:41.188468 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 00:14:41.188488 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 00:14:41.188503 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 00:14:41.188522 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 00:14:41.188535 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 00:14:42.658851 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:42Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:14:42.659106 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:42Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:14:42.659226 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:42Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:14:42.659394 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:42Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:14:42.659447 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:42Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 00:14:42.659504 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-13T00:14:42Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 00:14:43.067309 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:14:43.067349 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:14:43.068756 systemd[1]: Starting systemd-random-seed.service... May 13 00:14:43.070832 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:14:43.078994 systemd[1]: Starting systemd-sysctl.service... May 13 00:14:43.079015 systemd[1]: Started systemd-journald.service. May 13 00:14:43.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.076091 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:14:43.076872 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:14:43.081726 systemd[1]: Starting systemd-journal-flush.service... May 13 00:14:43.082992 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:14:43.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.084113 systemd[1]: Finished systemd-random-seed.service. May 13 00:14:43.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.085085 systemd[1]: Reached target first-boot-complete.target. May 13 00:14:43.086996 systemd[1]: Starting systemd-udev-settle.service... May 13 00:14:43.093472 systemd-journald[989]: Time spent on flushing to /var/log/journal/e016f2a05dfb40e6a60c02addaadc011 is 20.849ms for 1008 entries. May 13 00:14:43.093472 systemd-journald[989]: System Journal (/var/log/journal/e016f2a05dfb40e6a60c02addaadc011) is 8.0M, max 195.6M, 187.6M free. May 13 00:14:43.122364 systemd-journald[989]: Received client request to flush runtime journal. May 13 00:14:43.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.095019 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:14:43.122759 udevadm[1025]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 13 00:14:43.097382 systemd[1]: Starting systemd-sysusers.service... May 13 00:14:43.105983 systemd[1]: Finished systemd-sysctl.service. May 13 00:14:43.112783 systemd[1]: Finished systemd-sysusers.service. May 13 00:14:43.114491 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:14:43.123148 systemd[1]: Finished systemd-journal-flush.service. May 13 00:14:43.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.132194 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:14:43.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.452135 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:14:43.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.453000 audit: BPF prog-id=24 op=LOAD May 13 00:14:43.453000 audit: BPF prog-id=25 op=LOAD May 13 00:14:43.453000 audit: BPF prog-id=7 op=UNLOAD May 13 00:14:43.453000 audit: BPF prog-id=8 op=UNLOAD May 13 00:14:43.454315 systemd[1]: Starting systemd-udevd.service... May 13 00:14:43.475177 systemd-udevd[1032]: Using default interface naming scheme 'v252'. May 13 00:14:43.486721 systemd[1]: Started systemd-udevd.service. May 13 00:14:43.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.490000 audit: BPF prog-id=26 op=LOAD May 13 00:14:43.494933 systemd[1]: Starting systemd-networkd.service... May 13 00:14:43.513117 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 13 00:14:43.514000 audit: BPF prog-id=27 op=LOAD May 13 00:14:43.514000 audit: BPF prog-id=28 op=LOAD May 13 00:14:43.514000 audit: BPF prog-id=29 op=LOAD May 13 00:14:43.515181 systemd[1]: Starting systemd-userdbd.service... May 13 00:14:43.551054 systemd[1]: Started systemd-userdbd.service. May 13 00:14:43.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.572621 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:14:43.597648 systemd[1]: Finished systemd-udev-settle.service. May 13 00:14:43.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.599649 systemd[1]: Starting lvm2-activation-early.service... May 13 00:14:43.599722 systemd-networkd[1052]: lo: Link UP May 13 00:14:43.599726 systemd-networkd[1052]: lo: Gained carrier May 13 00:14:43.600089 systemd-networkd[1052]: Enumeration completed May 13 00:14:43.600195 systemd-networkd[1052]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:14:43.600402 systemd[1]: Started systemd-networkd.service. May 13 00:14:43.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.601490 systemd-networkd[1052]: eth0: Link UP May 13 00:14:43.601499 systemd-networkd[1052]: eth0: Gained carrier May 13 00:14:43.607445 lvm[1065]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:14:43.628409 systemd-networkd[1052]: eth0: DHCPv4 address 10.0.0.7/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:14:43.640063 systemd[1]: Finished lvm2-activation-early.service. May 13 00:14:43.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.640979 systemd[1]: Reached target cryptsetup.target. May 13 00:14:43.642794 systemd[1]: Starting lvm2-activation.service... May 13 00:14:43.646294 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:14:43.673183 systemd[1]: Finished lvm2-activation.service. May 13 00:14:43.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.673971 systemd[1]: Reached target local-fs-pre.target. May 13 00:14:43.674632 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:14:43.674661 systemd[1]: Reached target local-fs.target. May 13 00:14:43.675232 systemd[1]: Reached target machines.target. May 13 00:14:43.677010 systemd[1]: Starting ldconfig.service... May 13 00:14:43.678554 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:14:43.678630 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:14:43.679733 systemd[1]: Starting systemd-boot-update.service... May 13 00:14:43.681582 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:14:43.683557 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:14:43.686538 systemd[1]: Starting systemd-sysext.service... May 13 00:14:43.690460 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1068 (bootctl) May 13 00:14:43.691566 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:14:43.693423 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:14:43.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.701501 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:14:43.712709 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:14:43.712929 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:14:43.751168 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:14:43.751537 kernel: loop0: detected capacity change from 0 to 189592 May 13 00:14:43.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.766631 systemd-fsck[1078]: fsck.fat 4.2 (2021-01-31) May 13 00:14:43.766631 systemd-fsck[1078]: /dev/vda1: 236 files, 117310/258078 clusters May 13 00:14:43.767269 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:14:43.769115 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:14:43.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.790240 kernel: loop1: detected capacity change from 0 to 189592 May 13 00:14:43.797352 (sd-sysext)[1081]: Using extensions 'kubernetes'. May 13 00:14:43.797739 (sd-sysext)[1081]: Merged extensions into '/usr'. May 13 00:14:43.816464 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:14:43.817959 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:14:43.820071 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:14:43.822055 systemd[1]: Starting modprobe@loop.service... May 13 00:14:43.822983 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:14:43.823143 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:14:43.824074 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:14:43.824229 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:14:43.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.825617 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:14:43.825888 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:14:43.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.827065 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:14:43.827245 systemd[1]: Finished modprobe@loop.service. May 13 00:14:43.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:43.828536 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:14:43.828643 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:14:43.862271 ldconfig[1067]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:14:43.867295 systemd[1]: Finished ldconfig.service. May 13 00:14:43.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.028437 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:14:44.030446 systemd[1]: Mounting boot.mount... May 13 00:14:44.032381 systemd[1]: Mounting usr-share-oem.mount... May 13 00:14:44.039016 systemd[1]: Mounted boot.mount. May 13 00:14:44.039887 systemd[1]: Mounted usr-share-oem.mount. May 13 00:14:44.041873 systemd[1]: Finished systemd-sysext.service. May 13 00:14:44.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.044257 systemd[1]: Starting ensure-sysext.service... May 13 00:14:44.046058 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:14:44.047311 systemd[1]: Finished systemd-boot-update.service. May 13 00:14:44.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.051752 systemd[1]: Reloading. May 13 00:14:44.056336 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:14:44.057449 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:14:44.058781 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:14:44.085791 /usr/lib/systemd/system-generators/torcx-generator[1109]: time="2025-05-13T00:14:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:14:44.086259 /usr/lib/systemd/system-generators/torcx-generator[1109]: time="2025-05-13T00:14:44Z" level=info msg="torcx already run" May 13 00:14:44.158979 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:14:44.159001 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:14:44.174977 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:14:44.216000 audit: BPF prog-id=30 op=LOAD May 13 00:14:44.216000 audit: BPF prog-id=31 op=LOAD May 13 00:14:44.216000 audit: BPF prog-id=24 op=UNLOAD May 13 00:14:44.217000 audit: BPF prog-id=25 op=UNLOAD May 13 00:14:44.217000 audit: BPF prog-id=32 op=LOAD May 13 00:14:44.217000 audit: BPF prog-id=26 op=UNLOAD May 13 00:14:44.219000 audit: BPF prog-id=33 op=LOAD May 13 00:14:44.219000 audit: BPF prog-id=21 op=UNLOAD May 13 00:14:44.219000 audit: BPF prog-id=34 op=LOAD May 13 00:14:44.219000 audit: BPF prog-id=35 op=LOAD May 13 00:14:44.219000 audit: BPF prog-id=22 op=UNLOAD May 13 00:14:44.219000 audit: BPF prog-id=23 op=UNLOAD May 13 00:14:44.220000 audit: BPF prog-id=36 op=LOAD May 13 00:14:44.220000 audit: BPF prog-id=27 op=UNLOAD May 13 00:14:44.220000 audit: BPF prog-id=37 op=LOAD May 13 00:14:44.220000 audit: BPF prog-id=38 op=LOAD May 13 00:14:44.220000 audit: BPF prog-id=28 op=UNLOAD May 13 00:14:44.220000 audit: BPF prog-id=29 op=UNLOAD May 13 00:14:44.222135 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:14:44.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.228641 systemd[1]: Starting audit-rules.service... May 13 00:14:44.230631 systemd[1]: Starting clean-ca-certificates.service... May 13 00:14:44.236000 audit: BPF prog-id=39 op=LOAD May 13 00:14:44.233031 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:14:44.237791 systemd[1]: Starting systemd-resolved.service... May 13 00:14:44.239000 audit: BPF prog-id=40 op=LOAD May 13 00:14:44.240958 systemd[1]: Starting systemd-timesyncd.service... May 13 00:14:44.242811 systemd[1]: Starting systemd-update-utmp.service... May 13 00:14:44.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.244473 systemd[1]: Finished clean-ca-certificates.service. May 13 00:14:44.247412 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:14:44.249288 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:14:44.250000 audit[1158]: SYSTEM_BOOT pid=1158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:14:44.250673 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:14:44.252698 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:14:44.254641 systemd[1]: Starting modprobe@loop.service... May 13 00:14:44.256602 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:14:44.256748 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:14:44.256849 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:14:44.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.257638 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:14:44.257777 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:14:44.258886 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:14:44.259001 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:14:44.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.260142 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:14:44.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.261398 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:14:44.261528 systemd[1]: Finished modprobe@loop.service. May 13 00:14:44.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.264398 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:14:44.264574 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:14:44.266202 systemd[1]: Starting systemd-update-done.service... May 13 00:14:44.268604 systemd[1]: Finished systemd-update-utmp.service. May 13 00:14:44.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.273198 systemd[1]: Finished systemd-update-done.service. May 13 00:14:44.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.279670 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:14:44.282477 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:14:44.284792 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:14:44.287247 systemd[1]: Starting modprobe@loop.service... May 13 00:14:44.288347 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:14:44.288501 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:14:44.288607 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:14:44.289760 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:14:44.289919 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:14:44.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.291396 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:14:44.291524 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:14:44.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.293083 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:14:44.293463 systemd[1]: Finished modprobe@loop.service. May 13 00:14:44.294580 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:14:44.294713 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:14:44.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:44.300793 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:14:44.302554 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:14:44.305107 systemd-timesyncd[1157]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 13 00:14:44.305165 systemd-timesyncd[1157]: Initial clock synchronization to Tue 2025-05-13 00:14:44.577225 UTC. May 13 00:14:44.305399 systemd[1]: Starting modprobe@drm.service... May 13 00:14:44.308759 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:14:44.310925 systemd[1]: Starting modprobe@loop.service... May 13 00:14:44.310000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:14:44.310000 audit[1174]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffce0f8260 a2=420 a3=0 items=0 ppid=1147 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:44.310000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:14:44.311592 augenrules[1174]: No rules May 13 00:14:44.311678 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:14:44.311818 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:14:44.311882 systemd-resolved[1151]: Positive Trust Anchors: May 13 00:14:44.311893 systemd-resolved[1151]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:14:44.311921 systemd-resolved[1151]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:14:44.313201 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:14:44.314359 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:14:44.315356 systemd[1]: Started systemd-timesyncd.service. May 13 00:14:44.316855 systemd[1]: Finished audit-rules.service. May 13 00:14:44.317936 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:14:44.318073 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:14:44.319137 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:14:44.319274 systemd[1]: Finished modprobe@drm.service. May 13 00:14:44.320367 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:14:44.320491 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:14:44.321534 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:14:44.321650 systemd[1]: Finished modprobe@loop.service. May 13 00:14:44.322934 systemd[1]: Reached target time-set.target. May 13 00:14:44.323836 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:14:44.323891 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:14:44.324196 systemd[1]: Finished ensure-sysext.service. May 13 00:14:44.330831 systemd-resolved[1151]: Defaulting to hostname 'linux'. May 13 00:14:44.332318 systemd[1]: Started systemd-resolved.service. May 13 00:14:44.333006 systemd[1]: Reached target network.target. May 13 00:14:44.333598 systemd[1]: Reached target nss-lookup.target. May 13 00:14:44.334180 systemd[1]: Reached target sysinit.target. May 13 00:14:44.335023 systemd[1]: Started motdgen.path. May 13 00:14:44.335631 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:14:44.336614 systemd[1]: Started logrotate.timer. May 13 00:14:44.337280 systemd[1]: Started mdadm.timer. May 13 00:14:44.337798 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:14:44.338436 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:14:44.338469 systemd[1]: Reached target paths.target. May 13 00:14:44.339045 systemd[1]: Reached target timers.target. May 13 00:14:44.340031 systemd[1]: Listening on dbus.socket. May 13 00:14:44.341833 systemd[1]: Starting docker.socket... May 13 00:14:44.345928 systemd[1]: Listening on sshd.socket. May 13 00:14:44.346791 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:14:44.347483 systemd[1]: Listening on docker.socket. May 13 00:14:44.348170 systemd[1]: Reached target sockets.target. May 13 00:14:44.348802 systemd[1]: Reached target basic.target. May 13 00:14:44.349444 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:14:44.349479 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:14:44.350581 systemd[1]: Starting containerd.service... May 13 00:14:44.352469 systemd[1]: Starting dbus.service... May 13 00:14:44.354510 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:14:44.356546 systemd[1]: Starting extend-filesystems.service... May 13 00:14:44.357353 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:14:44.358725 systemd[1]: Starting motdgen.service... May 13 00:14:44.359504 jq[1189]: false May 13 00:14:44.364906 systemd[1]: Starting prepare-helm.service... May 13 00:14:44.366932 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:14:44.369362 systemd[1]: Starting sshd-keygen.service... May 13 00:14:44.372965 systemd[1]: Starting systemd-logind.service... May 13 00:14:44.376353 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:14:44.376448 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:14:44.376892 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 00:14:44.377729 systemd[1]: Starting update-engine.service... May 13 00:14:44.379503 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:14:44.381997 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:14:44.382191 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:14:44.385917 jq[1206]: true May 13 00:14:44.383296 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:14:44.383501 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:14:44.390744 extend-filesystems[1190]: Found loop1 May 13 00:14:44.390744 extend-filesystems[1190]: Found vda May 13 00:14:44.390744 extend-filesystems[1190]: Found vda1 May 13 00:14:44.390744 extend-filesystems[1190]: Found vda2 May 13 00:14:44.390744 extend-filesystems[1190]: Found vda3 May 13 00:14:44.390744 extend-filesystems[1190]: Found usr May 13 00:14:44.390744 extend-filesystems[1190]: Found vda4 May 13 00:14:44.390744 extend-filesystems[1190]: Found vda6 May 13 00:14:44.390744 extend-filesystems[1190]: Found vda7 May 13 00:14:44.390744 extend-filesystems[1190]: Found vda9 May 13 00:14:44.390744 extend-filesystems[1190]: Checking size of /dev/vda9 May 13 00:14:44.389067 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:14:44.407482 dbus-daemon[1188]: [system] SELinux support is enabled May 13 00:14:44.415864 jq[1211]: true May 13 00:14:44.415925 tar[1210]: linux-arm64/helm May 13 00:14:44.389272 systemd[1]: Finished motdgen.service. May 13 00:14:44.407664 systemd[1]: Started dbus.service. May 13 00:14:44.410139 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:14:44.410167 systemd[1]: Reached target system-config.target. May 13 00:14:44.411068 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:14:44.411089 systemd[1]: Reached target user-config.target. May 13 00:14:44.418607 extend-filesystems[1190]: Resized partition /dev/vda9 May 13 00:14:44.430134 extend-filesystems[1230]: resize2fs 1.46.5 (30-Dec-2021) May 13 00:14:44.455248 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 13 00:14:44.470627 systemd-logind[1198]: Watching system buttons on /dev/input/event0 (Power Button) May 13 00:14:44.471237 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 13 00:14:44.471981 systemd-logind[1198]: New seat seat0. May 13 00:14:44.478758 systemd[1]: Started systemd-logind.service. May 13 00:14:44.489164 extend-filesystems[1230]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 00:14:44.489164 extend-filesystems[1230]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 00:14:44.489164 extend-filesystems[1230]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 13 00:14:44.493923 extend-filesystems[1190]: Resized filesystem in /dev/vda9 May 13 00:14:44.491670 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:14:44.494844 env[1212]: time="2025-05-13T00:14:44.489154360Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:14:44.491835 systemd[1]: Finished extend-filesystems.service. May 13 00:14:44.498565 bash[1238]: Updated "/home/core/.ssh/authorized_keys" May 13 00:14:44.498694 update_engine[1204]: I0513 00:14:44.498046 1204 main.cc:92] Flatcar Update Engine starting May 13 00:14:44.499033 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:14:44.502438 systemd[1]: Started update-engine.service. May 13 00:14:44.502646 update_engine[1204]: I0513 00:14:44.502465 1204 update_check_scheduler.cc:74] Next update check in 9m36s May 13 00:14:44.504970 systemd[1]: Started locksmithd.service. May 13 00:14:44.515157 env[1212]: time="2025-05-13T00:14:44.515099200Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:14:44.515383 env[1212]: time="2025-05-13T00:14:44.515272120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:14:44.517151 env[1212]: time="2025-05-13T00:14:44.517104600Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:14:44.517151 env[1212]: time="2025-05-13T00:14:44.517143800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:14:44.517431 env[1212]: time="2025-05-13T00:14:44.517402440Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:14:44.517431 env[1212]: time="2025-05-13T00:14:44.517428240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:14:44.517493 env[1212]: time="2025-05-13T00:14:44.517443280Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:14:44.517493 env[1212]: time="2025-05-13T00:14:44.517453320Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:14:44.517548 env[1212]: time="2025-05-13T00:14:44.517529880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:14:44.517764 env[1212]: time="2025-05-13T00:14:44.517744560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:14:44.517909 env[1212]: time="2025-05-13T00:14:44.517885640Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:14:44.517909 env[1212]: time="2025-05-13T00:14:44.517907080Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:14:44.517983 env[1212]: time="2025-05-13T00:14:44.517963360Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:14:44.517983 env[1212]: time="2025-05-13T00:14:44.517981400Z" level=info msg="metadata content store policy set" policy=shared May 13 00:14:44.522473 env[1212]: time="2025-05-13T00:14:44.522440000Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:14:44.522473 env[1212]: time="2025-05-13T00:14:44.522475440Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:14:44.522599 env[1212]: time="2025-05-13T00:14:44.522489600Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:14:44.522599 env[1212]: time="2025-05-13T00:14:44.522523400Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:14:44.522599 env[1212]: time="2025-05-13T00:14:44.522539920Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:14:44.522599 env[1212]: time="2025-05-13T00:14:44.522553160Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:14:44.522599 env[1212]: time="2025-05-13T00:14:44.522566360Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:14:44.522980 env[1212]: time="2025-05-13T00:14:44.522957560Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:14:44.523021 env[1212]: time="2025-05-13T00:14:44.522983280Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:14:44.523021 env[1212]: time="2025-05-13T00:14:44.523013160Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:14:44.523064 env[1212]: time="2025-05-13T00:14:44.523027720Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:14:44.523064 env[1212]: time="2025-05-13T00:14:44.523042200Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:14:44.523181 env[1212]: time="2025-05-13T00:14:44.523163200Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:14:44.523275 env[1212]: time="2025-05-13T00:14:44.523260560Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:14:44.523516 env[1212]: time="2025-05-13T00:14:44.523501440Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:14:44.523547 env[1212]: time="2025-05-13T00:14:44.523529800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523547 env[1212]: time="2025-05-13T00:14:44.523543760Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:14:44.523663 env[1212]: time="2025-05-13T00:14:44.523650760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523691 env[1212]: time="2025-05-13T00:14:44.523667080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523691 env[1212]: time="2025-05-13T00:14:44.523680160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523744 env[1212]: time="2025-05-13T00:14:44.523690600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523744 env[1212]: time="2025-05-13T00:14:44.523702520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523744 env[1212]: time="2025-05-13T00:14:44.523715760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523744 env[1212]: time="2025-05-13T00:14:44.523726600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523744 env[1212]: time="2025-05-13T00:14:44.523737520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523873 env[1212]: time="2025-05-13T00:14:44.523750080Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:14:44.523873 env[1212]: time="2025-05-13T00:14:44.523867280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523915 env[1212]: time="2025-05-13T00:14:44.523882280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523915 env[1212]: time="2025-05-13T00:14:44.523895680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:14:44.523915 env[1212]: time="2025-05-13T00:14:44.523907760Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:14:44.523972 env[1212]: time="2025-05-13T00:14:44.523922800Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:14:44.523972 env[1212]: time="2025-05-13T00:14:44.523933560Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:14:44.523972 env[1212]: time="2025-05-13T00:14:44.523952560Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:14:44.524026 env[1212]: time="2025-05-13T00:14:44.523987080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:14:44.524241 env[1212]: time="2025-05-13T00:14:44.524172360Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:14:44.526649 env[1212]: time="2025-05-13T00:14:44.524245160Z" level=info msg="Connect containerd service" May 13 00:14:44.526649 env[1212]: time="2025-05-13T00:14:44.524274480Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:14:44.526649 env[1212]: time="2025-05-13T00:14:44.524929120Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:14:44.526649 env[1212]: time="2025-05-13T00:14:44.525399880Z" level=info msg="Start subscribing containerd event" May 13 00:14:44.526649 env[1212]: time="2025-05-13T00:14:44.525445920Z" level=info msg="Start recovering state" May 13 00:14:44.526649 env[1212]: time="2025-05-13T00:14:44.525499400Z" level=info msg="Start event monitor" May 13 00:14:44.526649 env[1212]: time="2025-05-13T00:14:44.525518120Z" level=info msg="Start snapshots syncer" May 13 00:14:44.526649 env[1212]: time="2025-05-13T00:14:44.525526920Z" level=info msg="Start cni network conf syncer for default" May 13 00:14:44.526649 env[1212]: time="2025-05-13T00:14:44.525534080Z" level=info msg="Start streaming server" May 13 00:14:44.526649 env[1212]: time="2025-05-13T00:14:44.525744760Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:14:44.526649 env[1212]: time="2025-05-13T00:14:44.525782880Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:14:44.525988 systemd[1]: Started containerd.service. May 13 00:14:44.532573 env[1212]: time="2025-05-13T00:14:44.532488280Z" level=info msg="containerd successfully booted in 0.047890s" May 13 00:14:44.563647 locksmithd[1243]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:14:44.800560 tar[1210]: linux-arm64/LICENSE May 13 00:14:44.800663 tar[1210]: linux-arm64/README.md May 13 00:14:44.804638 systemd[1]: Finished prepare-helm.service. May 13 00:14:45.496508 systemd-networkd[1052]: eth0: Gained IPv6LL May 13 00:14:45.498296 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:14:45.499372 systemd[1]: Reached target network-online.target. May 13 00:14:45.501569 systemd[1]: Starting kubelet.service... May 13 00:14:46.133893 systemd[1]: Started kubelet.service. May 13 00:14:46.605490 sshd_keygen[1209]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:14:46.616614 kubelet[1255]: E0513 00:14:46.616493 1255 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:14:46.618623 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:14:46.618756 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:14:46.625601 systemd[1]: Finished sshd-keygen.service. May 13 00:14:46.627918 systemd[1]: Starting issuegen.service... May 13 00:14:46.632556 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:14:46.632701 systemd[1]: Finished issuegen.service. May 13 00:14:46.634773 systemd[1]: Starting systemd-user-sessions.service... May 13 00:14:46.640588 systemd[1]: Finished systemd-user-sessions.service. May 13 00:14:46.642823 systemd[1]: Started getty@tty1.service. May 13 00:14:46.645110 systemd[1]: Started serial-getty@ttyAMA0.service. May 13 00:14:46.646385 systemd[1]: Reached target getty.target. May 13 00:14:46.647459 systemd[1]: Reached target multi-user.target. May 13 00:14:46.649677 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:14:46.656121 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:14:46.656289 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:14:46.657344 systemd[1]: Startup finished in 575ms (kernel) + 4.439s (initrd) + 5.648s (userspace) = 10.664s. May 13 00:14:49.601983 systemd[1]: Created slice system-sshd.slice. May 13 00:14:49.605916 systemd[1]: Started sshd@0-10.0.0.7:22-10.0.0.1:53678.service. May 13 00:14:49.656447 sshd[1277]: Accepted publickey for core from 10.0.0.1 port 53678 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:14:49.659213 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:14:49.670155 systemd[1]: Created slice user-500.slice. May 13 00:14:49.671596 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:14:49.677419 systemd-logind[1198]: New session 1 of user core. May 13 00:14:49.681068 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:14:49.685742 systemd[1]: Starting user@500.service... May 13 00:14:49.688586 (systemd)[1280]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:14:49.754727 systemd[1280]: Queued start job for default target default.target. May 13 00:14:49.755569 systemd[1280]: Reached target paths.target. May 13 00:14:49.755605 systemd[1280]: Reached target sockets.target. May 13 00:14:49.755628 systemd[1280]: Reached target timers.target. May 13 00:14:49.755641 systemd[1280]: Reached target basic.target. May 13 00:14:49.757789 systemd[1280]: Reached target default.target. May 13 00:14:49.757901 systemd[1]: Started user@500.service. May 13 00:14:49.759282 systemd[1280]: Startup finished in 62ms. May 13 00:14:49.760018 systemd[1]: Started session-1.scope. May 13 00:14:49.814920 systemd[1]: Started sshd@1-10.0.0.7:22-10.0.0.1:53694.service. May 13 00:14:49.858277 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 53694 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:14:49.859519 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:14:49.864514 systemd-logind[1198]: New session 2 of user core. May 13 00:14:49.864566 systemd[1]: Started session-2.scope. May 13 00:14:49.919500 sshd[1289]: pam_unix(sshd:session): session closed for user core May 13 00:14:49.922832 systemd[1]: sshd@1-10.0.0.7:22-10.0.0.1:53694.service: Deactivated successfully. May 13 00:14:49.923486 systemd[1]: session-2.scope: Deactivated successfully. May 13 00:14:49.924037 systemd-logind[1198]: Session 2 logged out. Waiting for processes to exit. May 13 00:14:49.925110 systemd[1]: Started sshd@2-10.0.0.7:22-10.0.0.1:53696.service. May 13 00:14:49.925800 systemd-logind[1198]: Removed session 2. May 13 00:14:49.968976 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 53696 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:14:49.970264 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:14:49.973942 systemd-logind[1198]: New session 3 of user core. May 13 00:14:49.974422 systemd[1]: Started session-3.scope. May 13 00:14:50.027066 sshd[1295]: pam_unix(sshd:session): session closed for user core May 13 00:14:50.029991 systemd[1]: sshd@2-10.0.0.7:22-10.0.0.1:53696.service: Deactivated successfully. May 13 00:14:50.030643 systemd[1]: session-3.scope: Deactivated successfully. May 13 00:14:50.031156 systemd-logind[1198]: Session 3 logged out. Waiting for processes to exit. May 13 00:14:50.032259 systemd[1]: Started sshd@3-10.0.0.7:22-10.0.0.1:53698.service. May 13 00:14:50.032893 systemd-logind[1198]: Removed session 3. May 13 00:14:50.075336 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 53698 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:14:50.076626 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:14:50.081151 systemd-logind[1198]: New session 4 of user core. May 13 00:14:50.082010 systemd[1]: Started session-4.scope. May 13 00:14:50.137977 sshd[1301]: pam_unix(sshd:session): session closed for user core May 13 00:14:50.142138 systemd[1]: sshd@3-10.0.0.7:22-10.0.0.1:53698.service: Deactivated successfully. May 13 00:14:50.142714 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:14:50.143361 systemd-logind[1198]: Session 4 logged out. Waiting for processes to exit. May 13 00:14:50.144767 systemd[1]: Started sshd@4-10.0.0.7:22-10.0.0.1:53708.service. May 13 00:14:50.145657 systemd-logind[1198]: Removed session 4. May 13 00:14:50.188045 sshd[1307]: Accepted publickey for core from 10.0.0.1 port 53708 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:14:50.189445 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:14:50.194795 systemd-logind[1198]: New session 5 of user core. May 13 00:14:50.195296 systemd[1]: Started session-5.scope. May 13 00:14:50.263809 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:14:50.266047 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:14:50.277420 dbus-daemon[1188]: avc: received setenforce notice (enforcing=1) May 13 00:14:50.278521 sudo[1310]: pam_unix(sudo:session): session closed for user root May 13 00:14:50.286981 sshd[1307]: pam_unix(sshd:session): session closed for user core May 13 00:14:50.291130 systemd[1]: sshd@4-10.0.0.7:22-10.0.0.1:53708.service: Deactivated successfully. May 13 00:14:50.291808 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:14:50.293206 systemd-logind[1198]: Session 5 logged out. Waiting for processes to exit. May 13 00:14:50.295087 systemd[1]: Started sshd@5-10.0.0.7:22-10.0.0.1:53722.service. May 13 00:14:50.296151 systemd-logind[1198]: Removed session 5. May 13 00:14:50.339097 sshd[1314]: Accepted publickey for core from 10.0.0.1 port 53722 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:14:50.340841 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:14:50.346073 systemd-logind[1198]: New session 6 of user core. May 13 00:14:50.346592 systemd[1]: Started session-6.scope. May 13 00:14:50.403819 sudo[1318]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:14:50.404038 sudo[1318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:14:50.406884 sudo[1318]: pam_unix(sudo:session): session closed for user root May 13 00:14:50.411641 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:14:50.411866 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:14:50.421837 systemd[1]: Stopping audit-rules.service... May 13 00:14:50.421000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:14:50.423187 auditctl[1321]: No rules May 13 00:14:50.423418 kernel: kauditd_printk_skb: 134 callbacks suppressed May 13 00:14:50.423448 kernel: audit: type=1305 audit(1747095290.421:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:14:50.423610 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:14:50.423777 systemd[1]: Stopped audit-rules.service. May 13 00:14:50.421000 audit[1321]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffc83ced0 a2=420 a3=0 items=0 ppid=1 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.425187 systemd[1]: Starting audit-rules.service... May 13 00:14:50.428086 kernel: audit: type=1300 audit(1747095290.421:208): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffc83ced0 a2=420 a3=0 items=0 ppid=1 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.428148 kernel: audit: type=1327 audit(1747095290.421:208): proctitle=2F7362696E2F617564697463746C002D44 May 13 00:14:50.421000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:14:50.428561 kernel: audit: type=1131 audit(1747095290.422:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:50.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:50.441960 augenrules[1338]: No rules May 13 00:14:50.442876 systemd[1]: Finished audit-rules.service. May 13 00:14:50.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:50.443735 sudo[1317]: pam_unix(sudo:session): session closed for user root May 13 00:14:50.442000 audit[1317]: USER_END pid=1317 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:14:50.447778 kernel: audit: type=1130 audit(1747095290.441:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:50.447815 kernel: audit: type=1106 audit(1747095290.442:211): pid=1317 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:14:50.442000 audit[1317]: CRED_DISP pid=1317 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:14:50.448260 sshd[1314]: pam_unix(sshd:session): session closed for user core May 13 00:14:50.450276 kernel: audit: type=1104 audit(1747095290.442:212): pid=1317 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:14:50.451966 kernel: audit: type=1106 audit(1747095290.449:213): pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:14:50.449000 audit[1314]: USER_END pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:14:50.452377 systemd[1]: Started sshd@6-10.0.0.7:22-10.0.0.1:53724.service. May 13 00:14:50.452900 systemd[1]: sshd@5-10.0.0.7:22-10.0.0.1:53722.service: Deactivated successfully. May 13 00:14:50.449000 audit[1314]: CRED_DISP pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:14:50.453564 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:14:50.454137 systemd-logind[1198]: Session 6 logged out. Waiting for processes to exit. May 13 00:14:50.455167 systemd-logind[1198]: Removed session 6. May 13 00:14:50.455952 kernel: audit: type=1104 audit(1747095290.449:214): pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:14:50.456002 kernel: audit: type=1130 audit(1747095290.451:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.7:22-10.0.0.1:53724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:50.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.7:22-10.0.0.1:53724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:50.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.7:22-10.0.0.1:53722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:50.495000 audit[1343]: USER_ACCT pid=1343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:14:50.496873 sshd[1343]: Accepted publickey for core from 10.0.0.1 port 53724 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:14:50.496000 audit[1343]: CRED_ACQ pid=1343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:14:50.496000 audit[1343]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdda77c50 a2=3 a3=1 items=0 ppid=1 pid=1343 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.496000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:14:50.498049 sshd[1343]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:14:50.501734 systemd-logind[1198]: New session 7 of user core. May 13 00:14:50.502163 systemd[1]: Started session-7.scope. May 13 00:14:50.504000 audit[1343]: USER_START pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:14:50.506000 audit[1346]: CRED_ACQ pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:14:50.555374 sudo[1347]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:14:50.555606 sudo[1347]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:14:50.554000 audit[1347]: USER_ACCT pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:14:50.554000 audit[1347]: CRED_REFR pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:14:50.556000 audit[1347]: USER_START pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:14:50.631713 systemd[1]: Starting docker.service... May 13 00:14:50.724290 env[1359]: time="2025-05-13T00:14:50.724156382Z" level=info msg="Starting up" May 13 00:14:50.726782 env[1359]: time="2025-05-13T00:14:50.726684097Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:14:50.726782 env[1359]: time="2025-05-13T00:14:50.726779331Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:14:50.726884 env[1359]: time="2025-05-13T00:14:50.726799598Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:14:50.726884 env[1359]: time="2025-05-13T00:14:50.726810058Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:14:50.728942 env[1359]: time="2025-05-13T00:14:50.728919356Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:14:50.728942 env[1359]: time="2025-05-13T00:14:50.728938728Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:14:50.729018 env[1359]: time="2025-05-13T00:14:50.728951304Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:14:50.729018 env[1359]: time="2025-05-13T00:14:50.728959606Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:14:50.885183 env[1359]: time="2025-05-13T00:14:50.885133723Z" level=info msg="Loading containers: start." May 13 00:14:50.934000 audit[1393]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:50.934000 audit[1393]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffdf86bb80 a2=0 a3=1 items=0 ppid=1359 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.934000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 00:14:50.935000 audit[1395]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:50.935000 audit[1395]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffdd00fdd0 a2=0 a3=1 items=0 ppid=1359 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.935000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 00:14:50.937000 audit[1397]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:50.937000 audit[1397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc4d7d7c0 a2=0 a3=1 items=0 ppid=1359 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.937000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:14:50.939000 audit[1399]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:50.939000 audit[1399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffbf2aef0 a2=0 a3=1 items=0 ppid=1359 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.939000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:14:50.941000 audit[1401]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:50.941000 audit[1401]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe47b98a0 a2=0 a3=1 items=0 ppid=1359 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 13 00:14:50.980000 audit[1406]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:50.980000 audit[1406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffde36e1c0 a2=0 a3=1 items=0 ppid=1359 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 13 00:14:50.988000 audit[1408]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:50.988000 audit[1408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc6ce5bd0 a2=0 a3=1 items=0 ppid=1359 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.988000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 13 00:14:50.990000 audit[1410]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:50.990000 audit[1410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffeaec2c40 a2=0 a3=1 items=0 ppid=1359 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 13 00:14:50.992000 audit[1412]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:50.992000 audit[1412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff0a7fbf0 a2=0 a3=1 items=0 ppid=1359 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.992000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:14:50.998000 audit[1416]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:50.998000 audit[1416]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd9c60d90 a2=0 a3=1 items=0 ppid=1359 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:50.998000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:14:51.007000 audit[1417]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.007000 audit[1417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd0421e10 a2=0 a3=1 items=0 ppid=1359 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:14:51.019269 kernel: Initializing XFRM netlink socket May 13 00:14:51.043118 env[1359]: time="2025-05-13T00:14:51.043068668Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 13 00:14:51.062000 audit[1425]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.062000 audit[1425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff0bff220 a2=0 a3=1 items=0 ppid=1359 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.062000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 13 00:14:51.076000 audit[1428]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.076000 audit[1428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd6201ef0 a2=0 a3=1 items=0 ppid=1359 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.076000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 13 00:14:51.078000 audit[1431]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.078000 audit[1431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe3ea20e0 a2=0 a3=1 items=0 ppid=1359 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.078000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 13 00:14:51.080000 audit[1433]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.080000 audit[1433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcb36ea60 a2=0 a3=1 items=0 ppid=1359 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.080000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 13 00:14:51.082000 audit[1435]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.082000 audit[1435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffee963160 a2=0 a3=1 items=0 ppid=1359 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.082000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 13 00:14:51.083000 audit[1437]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.083000 audit[1437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffcea8a1a0 a2=0 a3=1 items=0 ppid=1359 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.083000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 13 00:14:51.085000 audit[1439]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.085000 audit[1439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff9a608c0 a2=0 a3=1 items=0 ppid=1359 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.085000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 13 00:14:51.092000 audit[1442]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.092000 audit[1442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffffdbd3c30 a2=0 a3=1 items=0 ppid=1359 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.092000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 13 00:14:51.094000 audit[1444]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.094000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff038ef20 a2=0 a3=1 items=0 ppid=1359 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.094000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:14:51.096000 audit[1446]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.096000 audit[1446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe6acc860 a2=0 a3=1 items=0 ppid=1359 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.096000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:14:51.097000 audit[1448]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.097000 audit[1448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd5d1fc70 a2=0 a3=1 items=0 ppid=1359 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.097000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 13 00:14:51.099384 systemd-networkd[1052]: docker0: Link UP May 13 00:14:51.106000 audit[1452]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.106000 audit[1452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe23aaf60 a2=0 a3=1 items=0 ppid=1359 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:14:51.115000 audit[1453]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:14:51.115000 audit[1453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc599a650 a2=0 a3=1 items=0 ppid=1359 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:14:51.115000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:14:51.117591 env[1359]: time="2025-05-13T00:14:51.117543093Z" level=info msg="Loading containers: done." May 13 00:14:51.139845 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck367119157-merged.mount: Deactivated successfully. May 13 00:14:51.147314 env[1359]: time="2025-05-13T00:14:51.147263775Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 13 00:14:51.147490 env[1359]: time="2025-05-13T00:14:51.147481571Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 13 00:14:51.147613 env[1359]: time="2025-05-13T00:14:51.147586266Z" level=info msg="Daemon has completed initialization" May 13 00:14:51.160732 systemd[1]: Started docker.service. May 13 00:14:51.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:51.168803 env[1359]: time="2025-05-13T00:14:51.168681785Z" level=info msg="API listen on /run/docker.sock" May 13 00:14:51.766226 env[1212]: time="2025-05-13T00:14:51.766161759Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 13 00:14:52.421116 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3572916965.mount: Deactivated successfully. May 13 00:14:53.759977 env[1212]: time="2025-05-13T00:14:53.759927136Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:53.764692 env[1212]: time="2025-05-13T00:14:53.764635910Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef8fb1ea7c9599dbedea6f9d5589975ebc5bf4ec72f6be6acaaec59a723a09b3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:53.766213 env[1212]: time="2025-05-13T00:14:53.766178577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:53.769343 env[1212]: time="2025-05-13T00:14:53.769303002Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:53.769690 env[1212]: time="2025-05-13T00:14:53.769646937Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:ef8fb1ea7c9599dbedea6f9d5589975ebc5bf4ec72f6be6acaaec59a723a09b3\"" May 13 00:14:53.770806 env[1212]: time="2025-05-13T00:14:53.770779586Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 13 00:14:55.089103 env[1212]: time="2025-05-13T00:14:55.089036116Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:55.090203 env[1212]: time="2025-05-13T00:14:55.090167836Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ea6e6085feca75547d0422ab0536fe0d18c9ff5831de7a9d6a707c968027bb6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:55.092733 env[1212]: time="2025-05-13T00:14:55.092703935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:55.094783 env[1212]: time="2025-05-13T00:14:55.094751985Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:55.095926 env[1212]: time="2025-05-13T00:14:55.095896781Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:ea6e6085feca75547d0422ab0536fe0d18c9ff5831de7a9d6a707c968027bb6a\"" May 13 00:14:55.096452 env[1212]: time="2025-05-13T00:14:55.096428417Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 13 00:14:56.402438 env[1212]: time="2025-05-13T00:14:56.402375786Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:56.403697 env[1212]: time="2025-05-13T00:14:56.403670850Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d2db6ef0dd2f3e08bdfcd46afde7b755b05192841f563d8df54b807daaa7d8d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:56.405148 env[1212]: time="2025-05-13T00:14:56.405122975Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:56.406846 env[1212]: time="2025-05-13T00:14:56.406814440Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:56.407752 env[1212]: time="2025-05-13T00:14:56.407720722Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:1d2db6ef0dd2f3e08bdfcd46afde7b755b05192841f563d8df54b807daaa7d8d\"" May 13 00:14:56.408314 env[1212]: time="2025-05-13T00:14:56.408291397Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 13 00:14:56.869529 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 00:14:56.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:56.869706 systemd[1]: Stopped kubelet.service. May 13 00:14:56.870267 kernel: kauditd_printk_skb: 84 callbacks suppressed May 13 00:14:56.870320 kernel: audit: type=1130 audit(1747095296.868:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:56.871069 systemd[1]: Starting kubelet.service... May 13 00:14:56.872260 kernel: audit: type=1131 audit(1747095296.868:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:56.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:56.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:56.957102 systemd[1]: Started kubelet.service. May 13 00:14:56.960264 kernel: audit: type=1130 audit(1747095296.956:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:14:56.994434 kubelet[1496]: E0513 00:14:56.994383 1496 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:14:56.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:14:56.997398 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:14:56.997514 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:14:57.002272 kernel: audit: type=1131 audit(1747095296.996:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:14:57.606480 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3009499552.mount: Deactivated successfully. May 13 00:14:58.256905 env[1212]: time="2025-05-13T00:14:58.256859038Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:58.259107 env[1212]: time="2025-05-13T00:14:58.259075731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c5361ece77e80334cd5fb082c0b678cb3244f5834ecacea1719ae6b38b465581,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:58.261354 env[1212]: time="2025-05-13T00:14:58.261321759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:58.262963 env[1212]: time="2025-05-13T00:14:58.262923707Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:58.263529 env[1212]: time="2025-05-13T00:14:58.263486783Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:c5361ece77e80334cd5fb082c0b678cb3244f5834ecacea1719ae6b38b465581\"" May 13 00:14:58.264105 env[1212]: time="2025-05-13T00:14:58.264072837Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 13 00:14:58.837075 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1578010098.mount: Deactivated successfully. May 13 00:14:59.744947 env[1212]: time="2025-05-13T00:14:59.744899545Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:59.746504 env[1212]: time="2025-05-13T00:14:59.746476416Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:59.748921 env[1212]: time="2025-05-13T00:14:59.748894517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:59.750719 env[1212]: time="2025-05-13T00:14:59.750691054Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:14:59.751634 env[1212]: time="2025-05-13T00:14:59.751593243Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" May 13 00:14:59.752058 env[1212]: time="2025-05-13T00:14:59.752030887Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 13 00:15:00.246009 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1229927769.mount: Deactivated successfully. May 13 00:15:00.250915 env[1212]: time="2025-05-13T00:15:00.250872191Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:00.252177 env[1212]: time="2025-05-13T00:15:00.252147660Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:00.254654 env[1212]: time="2025-05-13T00:15:00.254630165Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:00.256699 env[1212]: time="2025-05-13T00:15:00.256660524Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:00.257356 env[1212]: time="2025-05-13T00:15:00.257325925Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 13 00:15:00.258079 env[1212]: time="2025-05-13T00:15:00.257822434Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 13 00:15:00.739500 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount727010769.mount: Deactivated successfully. May 13 00:15:03.263856 env[1212]: time="2025-05-13T00:15:03.263803737Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:03.265695 env[1212]: time="2025-05-13T00:15:03.265655696Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:03.267922 env[1212]: time="2025-05-13T00:15:03.267895203Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:03.270604 env[1212]: time="2025-05-13T00:15:03.270571368Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:03.271465 env[1212]: time="2025-05-13T00:15:03.271432649Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da\"" May 13 00:15:07.248280 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 00:15:07.248457 systemd[1]: Stopped kubelet.service. May 13 00:15:07.254350 kernel: audit: type=1130 audit(1747095307.247:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:07.254468 kernel: audit: type=1131 audit(1747095307.247:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:07.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:07.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:07.249917 systemd[1]: Starting kubelet.service... May 13 00:15:07.350885 systemd[1]: Started kubelet.service. May 13 00:15:07.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:07.354269 kernel: audit: type=1130 audit(1747095307.349:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:07.385152 kubelet[1528]: E0513 00:15:07.385097 1528 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:15:07.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:15:07.386698 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:15:07.386815 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:15:07.389227 kernel: audit: type=1131 audit(1747095307.385:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:15:08.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:08.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:08.888213 systemd[1]: Stopped kubelet.service. May 13 00:15:08.890383 systemd[1]: Starting kubelet.service... May 13 00:15:08.892550 kernel: audit: type=1130 audit(1747095308.887:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:08.892642 kernel: audit: type=1131 audit(1747095308.887:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:08.919793 systemd[1]: Reloading. May 13 00:15:08.978103 /usr/lib/systemd/system-generators/torcx-generator[1563]: time="2025-05-13T00:15:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:15:08.978136 /usr/lib/systemd/system-generators/torcx-generator[1563]: time="2025-05-13T00:15:08Z" level=info msg="torcx already run" May 13 00:15:09.212619 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:15:09.212640 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:15:09.230887 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:15:09.292116 kernel: audit: type=1400 audit(1747095309.283:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292241 kernel: audit: type=1400 audit(1747095309.283:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292267 kernel: audit: type=1400 audit(1747095309.283:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292283 kernel: audit: type=1400 audit(1747095309.283:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.285000 audit: BPF prog-id=46 op=LOAD May 13 00:15:09.285000 audit: BPF prog-id=40 op=UNLOAD May 13 00:15:09.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.287000 audit: BPF prog-id=47 op=LOAD May 13 00:15:09.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.288000 audit: BPF prog-id=48 op=LOAD May 13 00:15:09.288000 audit: BPF prog-id=30 op=UNLOAD May 13 00:15:09.288000 audit: BPF prog-id=31 op=UNLOAD May 13 00:15:09.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.290000 audit: BPF prog-id=49 op=LOAD May 13 00:15:09.290000 audit: BPF prog-id=32 op=UNLOAD May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit: BPF prog-id=50 op=LOAD May 13 00:15:09.292000 audit: BPF prog-id=41 op=UNLOAD May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit: BPF prog-id=51 op=LOAD May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.292000 audit: BPF prog-id=52 op=LOAD May 13 00:15:09.292000 audit: BPF prog-id=42 op=UNLOAD May 13 00:15:09.292000 audit: BPF prog-id=43 op=UNLOAD May 13 00:15:09.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.293000 audit: BPF prog-id=53 op=LOAD May 13 00:15:09.293000 audit: BPF prog-id=39 op=UNLOAD May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit: BPF prog-id=54 op=LOAD May 13 00:15:09.295000 audit: BPF prog-id=33 op=UNLOAD May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit: BPF prog-id=55 op=LOAD May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.295000 audit: BPF prog-id=56 op=LOAD May 13 00:15:09.295000 audit: BPF prog-id=34 op=UNLOAD May 13 00:15:09.295000 audit: BPF prog-id=35 op=UNLOAD May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit: BPF prog-id=57 op=LOAD May 13 00:15:09.296000 audit: BPF prog-id=36 op=UNLOAD May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit: BPF prog-id=58 op=LOAD May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit: BPF prog-id=59 op=LOAD May 13 00:15:09.296000 audit: BPF prog-id=37 op=UNLOAD May 13 00:15:09.296000 audit: BPF prog-id=38 op=UNLOAD May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:09.297000 audit: BPF prog-id=60 op=LOAD May 13 00:15:09.297000 audit: BPF prog-id=44 op=UNLOAD May 13 00:15:09.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:09.307516 systemd[1]: Started kubelet.service. May 13 00:15:09.311876 systemd[1]: Stopping kubelet.service... May 13 00:15:09.312166 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:15:09.312472 systemd[1]: Stopped kubelet.service. May 13 00:15:09.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:09.314522 systemd[1]: Starting kubelet.service... May 13 00:15:09.416042 systemd[1]: Started kubelet.service. May 13 00:15:09.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:09.453271 kubelet[1613]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:15:09.453271 kubelet[1613]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:15:09.453271 kubelet[1613]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:15:09.453665 kubelet[1613]: I0513 00:15:09.453562 1613 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:15:10.165015 kubelet[1613]: I0513 00:15:10.164976 1613 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 13 00:15:10.165155 kubelet[1613]: I0513 00:15:10.165144 1613 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:15:10.165611 kubelet[1613]: I0513 00:15:10.165592 1613 server.go:929] "Client rotation is on, will bootstrap in background" May 13 00:15:10.237208 kubelet[1613]: E0513 00:15:10.237160 1613 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.7:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.7:6443: connect: connection refused" logger="UnhandledError" May 13 00:15:10.238219 kubelet[1613]: I0513 00:15:10.238130 1613 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:15:10.248648 kubelet[1613]: E0513 00:15:10.248601 1613 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:15:10.248648 kubelet[1613]: I0513 00:15:10.248641 1613 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:15:10.252149 kubelet[1613]: I0513 00:15:10.252128 1613 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:15:10.253008 kubelet[1613]: I0513 00:15:10.252978 1613 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 13 00:15:10.253178 kubelet[1613]: I0513 00:15:10.253135 1613 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:15:10.253378 kubelet[1613]: I0513 00:15:10.253164 1613 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:15:10.253464 kubelet[1613]: I0513 00:15:10.253448 1613 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:15:10.253464 kubelet[1613]: I0513 00:15:10.253458 1613 container_manager_linux.go:300] "Creating device plugin manager" May 13 00:15:10.253644 kubelet[1613]: I0513 00:15:10.253632 1613 state_mem.go:36] "Initialized new in-memory state store" May 13 00:15:10.256819 kubelet[1613]: I0513 00:15:10.256793 1613 kubelet.go:408] "Attempting to sync node with API server" May 13 00:15:10.256819 kubelet[1613]: I0513 00:15:10.256823 1613 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:15:10.256937 kubelet[1613]: I0513 00:15:10.256916 1613 kubelet.go:314] "Adding apiserver pod source" May 13 00:15:10.256937 kubelet[1613]: I0513 00:15:10.256927 1613 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:15:10.259509 kubelet[1613]: W0513 00:15:10.259380 1613 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.7:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused May 13 00:15:10.259509 kubelet[1613]: E0513 00:15:10.259445 1613 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.7:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.7:6443: connect: connection refused" logger="UnhandledError" May 13 00:15:10.259509 kubelet[1613]: I0513 00:15:10.259506 1613 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:15:10.260259 kubelet[1613]: W0513 00:15:10.260148 1613 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused May 13 00:15:10.260385 kubelet[1613]: E0513 00:15:10.260360 1613 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.7:6443: connect: connection refused" logger="UnhandledError" May 13 00:15:10.261739 kubelet[1613]: I0513 00:15:10.261718 1613 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:15:10.262537 kubelet[1613]: W0513 00:15:10.262510 1613 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:15:10.263544 kubelet[1613]: I0513 00:15:10.263522 1613 server.go:1269] "Started kubelet" May 13 00:15:10.264671 kubelet[1613]: I0513 00:15:10.264615 1613 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:15:10.268972 kubelet[1613]: I0513 00:15:10.268902 1613 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:15:10.269436 kubelet[1613]: I0513 00:15:10.269380 1613 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:15:10.271440 kubelet[1613]: I0513 00:15:10.271405 1613 server.go:460] "Adding debug handlers to kubelet server" May 13 00:15:10.274667 kubelet[1613]: E0513 00:15:10.274638 1613 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:15:10.274000 audit[1613]: AVC avc: denied { mac_admin } for pid=1613 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:10.274000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:15:10.274000 audit[1613]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cf83c0 a1=4000cee948 a2=4000cf8390 a3=25 items=0 ppid=1 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.274000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:15:10.274000 audit[1613]: AVC avc: denied { mac_admin } for pid=1613 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:10.274000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:15:10.274000 audit[1613]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ce85e0 a1=4000cee960 a2=4000cf8450 a3=25 items=0 ppid=1 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.274000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:15:10.275371 kubelet[1613]: I0513 00:15:10.275017 1613 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:15:10.275371 kubelet[1613]: I0513 00:15:10.275057 1613 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:15:10.275371 kubelet[1613]: I0513 00:15:10.275136 1613 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:15:10.275371 kubelet[1613]: I0513 00:15:10.275298 1613 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:15:10.277309 kubelet[1613]: I0513 00:15:10.277283 1613 volume_manager.go:289] "Starting Kubelet Volume Manager" May 13 00:15:10.277629 kubelet[1613]: I0513 00:15:10.277600 1613 factory.go:221] Registration of the systemd container factory successfully May 13 00:15:10.277749 kubelet[1613]: I0513 00:15:10.277726 1613 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:15:10.278068 kubelet[1613]: I0513 00:15:10.278054 1613 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 13 00:15:10.278167 kubelet[1613]: I0513 00:15:10.278101 1613 reconciler.go:26] "Reconciler: start to sync state" May 13 00:15:10.278252 kubelet[1613]: E0513 00:15:10.278192 1613 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.7:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.7:6443: connect: connection refused" interval="200ms" May 13 00:15:10.278304 kubelet[1613]: E0513 00:15:10.277601 1613 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:15:10.278500 kubelet[1613]: E0513 00:15:10.274196 1613 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.7:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.7:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183eeded9d01a44c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-13 00:15:10.263493708 +0000 UTC m=+0.844036735,LastTimestamp:2025-05-13 00:15:10.263493708 +0000 UTC m=+0.844036735,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 13 00:15:10.278952 kubelet[1613]: W0513 00:15:10.278902 1613 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.7:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused May 13 00:15:10.279025 kubelet[1613]: E0513 00:15:10.278964 1613 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.7:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.7:6443: connect: connection refused" logger="UnhandledError" May 13 00:15:10.279962 kubelet[1613]: I0513 00:15:10.279922 1613 factory.go:221] Registration of the containerd container factory successfully May 13 00:15:10.285000 audit[1625]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:10.285000 audit[1625]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff988f0a0 a2=0 a3=1 items=0 ppid=1613 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:15:10.286000 audit[1626]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:10.286000 audit[1626]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff807a750 a2=0 a3=1 items=0 ppid=1613 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:15:10.288000 audit[1628]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:10.288000 audit[1628]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd12141d0 a2=0 a3=1 items=0 ppid=1613 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:15:10.290000 audit[1631]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:10.290000 audit[1631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe827de20 a2=0 a3=1 items=0 ppid=1613 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:15:10.294987 kubelet[1613]: I0513 00:15:10.294955 1613 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:15:10.294987 kubelet[1613]: I0513 00:15:10.294974 1613 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:15:10.294987 kubelet[1613]: I0513 00:15:10.294994 1613 state_mem.go:36] "Initialized new in-memory state store" May 13 00:15:10.301000 audit[1636]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:10.301000 audit[1636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdc40d1b0 a2=0 a3=1 items=0 ppid=1613 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:15:10.301959 kubelet[1613]: I0513 00:15:10.301803 1613 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:15:10.302000 audit[1639]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:10.302000 audit[1639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd43d63c0 a2=0 a3=1 items=0 ppid=1613 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:15:10.303053 kubelet[1613]: I0513 00:15:10.303032 1613 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:15:10.303132 kubelet[1613]: I0513 00:15:10.303118 1613 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:15:10.303204 kubelet[1613]: I0513 00:15:10.303193 1613 kubelet.go:2321] "Starting kubelet main sync loop" May 13 00:15:10.303356 kubelet[1613]: E0513 00:15:10.303334 1613 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:15:10.303597 kubelet[1613]: W0513 00:15:10.303571 1613 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.7:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused May 13 00:15:10.303643 kubelet[1613]: E0513 00:15:10.303611 1613 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.7:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.7:6443: connect: connection refused" logger="UnhandledError" May 13 00:15:10.303000 audit[1640]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:10.303000 audit[1640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe3468dd0 a2=0 a3=1 items=0 ppid=1613 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:15:10.303000 audit[1643]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:10.303000 audit[1643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeda4b410 a2=0 a3=1 items=0 ppid=1613 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:15:10.303000 audit[1644]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:10.303000 audit[1644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6227830 a2=0 a3=1 items=0 ppid=1613 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:15:10.313000 audit[1645]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:10.313000 audit[1645]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb72a660 a2=0 a3=1 items=0 ppid=1613 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:15:10.313000 audit[1646]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:10.313000 audit[1646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc3f39f40 a2=0 a3=1 items=0 ppid=1613 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:15:10.314000 audit[1647]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:10.314000 audit[1647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe7ff2240 a2=0 a3=1 items=0 ppid=1613 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:15:10.361614 kubelet[1613]: I0513 00:15:10.361562 1613 policy_none.go:49] "None policy: Start" May 13 00:15:10.362431 kubelet[1613]: I0513 00:15:10.362409 1613 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:15:10.362479 kubelet[1613]: I0513 00:15:10.362438 1613 state_mem.go:35] "Initializing new in-memory state store" May 13 00:15:10.372019 systemd[1]: Created slice kubepods.slice. May 13 00:15:10.376390 systemd[1]: Created slice kubepods-burstable.slice. May 13 00:15:10.378747 kubelet[1613]: E0513 00:15:10.378706 1613 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:15:10.379044 systemd[1]: Created slice kubepods-besteffort.slice. May 13 00:15:10.393632 kubelet[1613]: I0513 00:15:10.393596 1613 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:15:10.392000 audit[1613]: AVC avc: denied { mac_admin } for pid=1613 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:10.392000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:15:10.392000 audit[1613]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cf8f30 a1=4000d6f650 a2=4000cf8f00 a3=25 items=0 ppid=1 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:10.392000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:15:10.393907 kubelet[1613]: I0513 00:15:10.393670 1613 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:15:10.393907 kubelet[1613]: I0513 00:15:10.393819 1613 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:15:10.393907 kubelet[1613]: I0513 00:15:10.393830 1613 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:15:10.394093 kubelet[1613]: I0513 00:15:10.394076 1613 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:15:10.395982 kubelet[1613]: E0513 00:15:10.395933 1613 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 13 00:15:10.412094 systemd[1]: Created slice kubepods-burstable-pod3332f35c34cfb9cc1d390239dc9cec23.slice. May 13 00:15:10.448195 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 13 00:15:10.467534 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 13 00:15:10.479669 kubelet[1613]: E0513 00:15:10.479604 1613 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.7:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.7:6443: connect: connection refused" interval="400ms" May 13 00:15:10.497134 kubelet[1613]: I0513 00:15:10.496729 1613 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:15:10.497237 kubelet[1613]: E0513 00:15:10.497134 1613 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.7:6443/api/v1/nodes\": dial tcp 10.0.0.7:6443: connect: connection refused" node="localhost" May 13 00:15:10.579762 kubelet[1613]: I0513 00:15:10.579669 1613 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3332f35c34cfb9cc1d390239dc9cec23-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"3332f35c34cfb9cc1d390239dc9cec23\") " pod="kube-system/kube-apiserver-localhost" May 13 00:15:10.579762 kubelet[1613]: I0513 00:15:10.579719 1613 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:15:10.579762 kubelet[1613]: I0513 00:15:10.579739 1613 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:15:10.579762 kubelet[1613]: I0513 00:15:10.579754 1613 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3332f35c34cfb9cc1d390239dc9cec23-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"3332f35c34cfb9cc1d390239dc9cec23\") " pod="kube-system/kube-apiserver-localhost" May 13 00:15:10.579762 kubelet[1613]: I0513 00:15:10.579772 1613 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3332f35c34cfb9cc1d390239dc9cec23-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"3332f35c34cfb9cc1d390239dc9cec23\") " pod="kube-system/kube-apiserver-localhost" May 13 00:15:10.579982 kubelet[1613]: I0513 00:15:10.579793 1613 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:15:10.579982 kubelet[1613]: I0513 00:15:10.579807 1613 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:15:10.579982 kubelet[1613]: I0513 00:15:10.579821 1613 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:15:10.579982 kubelet[1613]: I0513 00:15:10.579838 1613 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 13 00:15:10.698634 kubelet[1613]: I0513 00:15:10.698499 1613 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:15:10.699311 kubelet[1613]: E0513 00:15:10.699075 1613 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.7:6443/api/v1/nodes\": dial tcp 10.0.0.7:6443: connect: connection refused" node="localhost" May 13 00:15:10.745712 kubelet[1613]: E0513 00:15:10.745651 1613 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:10.746713 env[1212]: time="2025-05-13T00:15:10.746446302Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:3332f35c34cfb9cc1d390239dc9cec23,Namespace:kube-system,Attempt:0,}" May 13 00:15:10.752542 kubelet[1613]: E0513 00:15:10.752511 1613 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:10.753327 env[1212]: time="2025-05-13T00:15:10.752906255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 13 00:15:10.770668 kubelet[1613]: E0513 00:15:10.769907 1613 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:10.770780 env[1212]: time="2025-05-13T00:15:10.770349537Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 13 00:15:10.880630 kubelet[1613]: E0513 00:15:10.880574 1613 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.7:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.7:6443: connect: connection refused" interval="800ms" May 13 00:15:11.101206 kubelet[1613]: I0513 00:15:11.100862 1613 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:15:11.101206 kubelet[1613]: E0513 00:15:11.101180 1613 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.7:6443/api/v1/nodes\": dial tcp 10.0.0.7:6443: connect: connection refused" node="localhost" May 13 00:15:11.135611 kubelet[1613]: W0513 00:15:11.135355 1613 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.7:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused May 13 00:15:11.135611 kubelet[1613]: E0513 00:15:11.135493 1613 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.7:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.7:6443: connect: connection refused" logger="UnhandledError" May 13 00:15:11.210013 kubelet[1613]: W0513 00:15:11.209940 1613 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused May 13 00:15:11.210137 kubelet[1613]: E0513 00:15:11.210013 1613 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.7:6443: connect: connection refused" logger="UnhandledError" May 13 00:15:11.231784 kubelet[1613]: W0513 00:15:11.231733 1613 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.7:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused May 13 00:15:11.231784 kubelet[1613]: E0513 00:15:11.231785 1613 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.7:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.7:6443: connect: connection refused" logger="UnhandledError" May 13 00:15:11.261751 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3700549390.mount: Deactivated successfully. May 13 00:15:11.267790 env[1212]: time="2025-05-13T00:15:11.267729685Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.274253 env[1212]: time="2025-05-13T00:15:11.274197073Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.275868 env[1212]: time="2025-05-13T00:15:11.275838325Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.277931 env[1212]: time="2025-05-13T00:15:11.277187790Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.278783 env[1212]: time="2025-05-13T00:15:11.278751801Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.283670 env[1212]: time="2025-05-13T00:15:11.281800259Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.286464 env[1212]: time="2025-05-13T00:15:11.284714496Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.287431 env[1212]: time="2025-05-13T00:15:11.287346634Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.289600 env[1212]: time="2025-05-13T00:15:11.289565176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.294880 env[1212]: time="2025-05-13T00:15:11.293499009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.295633 env[1212]: time="2025-05-13T00:15:11.295598946Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.299016 env[1212]: time="2025-05-13T00:15:11.298962457Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:11.325928 env[1212]: time="2025-05-13T00:15:11.325722547Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:11.325928 env[1212]: time="2025-05-13T00:15:11.325869983Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:11.325928 env[1212]: time="2025-05-13T00:15:11.325882436Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:11.327319 env[1212]: time="2025-05-13T00:15:11.326486714Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ae14dd5a1d752346e9a14e0963dd3149d532f9b5dea687ea4766026212dba93 pid=1660 runtime=io.containerd.runc.v2 May 13 00:15:11.330440 env[1212]: time="2025-05-13T00:15:11.330369333Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:11.330440 env[1212]: time="2025-05-13T00:15:11.330414901Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:11.330440 env[1212]: time="2025-05-13T00:15:11.330426153Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:11.330627 env[1212]: time="2025-05-13T00:15:11.330588204Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c093456bc7f93e61a142b51ca0dafce3c9084558a9a9b3fb8be29d064784b509 pid=1677 runtime=io.containerd.runc.v2 May 13 00:15:11.333288 env[1212]: time="2025-05-13T00:15:11.333047360Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:11.333288 env[1212]: time="2025-05-13T00:15:11.333090966Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:11.333288 env[1212]: time="2025-05-13T00:15:11.333103940Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:11.333288 env[1212]: time="2025-05-13T00:15:11.333228231Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9ce066632a998ddcdc8e0d63c688a3d2e687c8ebce8db260e48c2a89f5ae5d76 pid=1688 runtime=io.containerd.runc.v2 May 13 00:15:11.342097 systemd[1]: Started cri-containerd-6ae14dd5a1d752346e9a14e0963dd3149d532f9b5dea687ea4766026212dba93.scope. May 13 00:15:11.352336 systemd[1]: Started cri-containerd-c093456bc7f93e61a142b51ca0dafce3c9084558a9a9b3fb8be29d064784b509.scope. May 13 00:15:11.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.383000 audit: BPF prog-id=61 op=LOAD May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1660 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661653134646435613164373532333436653961313465303936336464 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1660 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661653134646435613164373532333436653961313465303936336464 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit: BPF prog-id=62 op=LOAD May 13 00:15:11.384000 audit[1678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1660 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661653134646435613164373532333436653961313465303936336464 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit: BPF prog-id=63 op=LOAD May 13 00:15:11.384000 audit[1678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1660 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661653134646435613164373532333436653961313465303936336464 May 13 00:15:11.384000 audit: BPF prog-id=63 op=UNLOAD May 13 00:15:11.384000 audit: BPF prog-id=62 op=UNLOAD May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.384000 audit: BPF prog-id=64 op=LOAD May 13 00:15:11.384000 audit[1678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1660 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661653134646435613164373532333436653961313465303936336464 May 13 00:15:11.386303 systemd[1]: Started cri-containerd-9ce066632a998ddcdc8e0d63c688a3d2e687c8ebce8db260e48c2a89f5ae5d76.scope. May 13 00:15:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.393000 audit: BPF prog-id=65 op=LOAD May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1677 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393334353662633766393365363161313432623531636130646166 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1677 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393334353662633766393365363161313432623531636130646166 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit: BPF prog-id=66 op=LOAD May 13 00:15:11.394000 audit[1695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1677 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393334353662633766393365363161313432623531636130646166 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit: BPF prog-id=67 op=LOAD May 13 00:15:11.394000 audit[1695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1677 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393334353662633766393365363161313432623531636130646166 May 13 00:15:11.394000 audit: BPF prog-id=67 op=UNLOAD May 13 00:15:11.394000 audit: BPF prog-id=66 op=UNLOAD May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.394000 audit: BPF prog-id=68 op=LOAD May 13 00:15:11.394000 audit[1695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1677 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393334353662633766393365363161313432623531636130646166 May 13 00:15:11.407917 env[1212]: time="2025-05-13T00:15:11.407876236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:3332f35c34cfb9cc1d390239dc9cec23,Namespace:kube-system,Attempt:0,} returns sandbox id \"6ae14dd5a1d752346e9a14e0963dd3149d532f9b5dea687ea4766026212dba93\"" May 13 00:15:11.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.407000 audit: BPF prog-id=69 op=LOAD May 13 00:15:11.409625 kubelet[1613]: E0513 00:15:11.409161 1613 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:11.408000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit[1714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1688 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963653036363633326139393864646364633865306436336336383861 May 13 00:15:11.408000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit[1714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1688 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963653036363633326139393864646364633865306436336336383861 May 13 00:15:11.408000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.408000 audit: BPF prog-id=70 op=LOAD May 13 00:15:11.408000 audit[1714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1688 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963653036363633326139393864646364633865306436336336383861 May 13 00:15:11.409000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.409000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.409000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.409000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.409000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.409000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.409000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.409000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.409000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.409000 audit: BPF prog-id=71 op=LOAD May 13 00:15:11.409000 audit[1714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1688 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963653036363633326139393864646364633865306436336336383861 May 13 00:15:11.409000 audit: BPF prog-id=71 op=UNLOAD May 13 00:15:11.412000 audit: BPF prog-id=70 op=UNLOAD May 13 00:15:11.412000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.412000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.412000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.412000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.412000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.412000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.412000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.412000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.412000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.412000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.412000 audit: BPF prog-id=72 op=LOAD May 13 00:15:11.412000 audit[1714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1688 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963653036363633326139393864646364633865306436336336383861 May 13 00:15:11.414492 env[1212]: time="2025-05-13T00:15:11.414455622Z" level=info msg="CreateContainer within sandbox \"6ae14dd5a1d752346e9a14e0963dd3149d532f9b5dea687ea4766026212dba93\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 13 00:15:11.427271 env[1212]: time="2025-05-13T00:15:11.427211488Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"c093456bc7f93e61a142b51ca0dafce3c9084558a9a9b3fb8be29d064784b509\"" May 13 00:15:11.428818 kubelet[1613]: E0513 00:15:11.428787 1613 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:11.431800 env[1212]: time="2025-05-13T00:15:11.431755485Z" level=info msg="CreateContainer within sandbox \"c093456bc7f93e61a142b51ca0dafce3c9084558a9a9b3fb8be29d064784b509\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 13 00:15:11.438680 env[1212]: time="2025-05-13T00:15:11.438626258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"9ce066632a998ddcdc8e0d63c688a3d2e687c8ebce8db260e48c2a89f5ae5d76\"" May 13 00:15:11.439450 kubelet[1613]: E0513 00:15:11.439424 1613 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:11.441209 env[1212]: time="2025-05-13T00:15:11.441175029Z" level=info msg="CreateContainer within sandbox \"9ce066632a998ddcdc8e0d63c688a3d2e687c8ebce8db260e48c2a89f5ae5d76\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 13 00:15:11.513016 env[1212]: time="2025-05-13T00:15:11.512963936Z" level=info msg="CreateContainer within sandbox \"6ae14dd5a1d752346e9a14e0963dd3149d532f9b5dea687ea4766026212dba93\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"fe4d249b0064c7e6c1239a156471774ebc233b385f2f2634e7b85cd6877c17e8\"" May 13 00:15:11.513633 env[1212]: time="2025-05-13T00:15:11.513608296Z" level=info msg="StartContainer for \"fe4d249b0064c7e6c1239a156471774ebc233b385f2f2634e7b85cd6877c17e8\"" May 13 00:15:11.526547 env[1212]: time="2025-05-13T00:15:11.526501627Z" level=info msg="CreateContainer within sandbox \"9ce066632a998ddcdc8e0d63c688a3d2e687c8ebce8db260e48c2a89f5ae5d76\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"7cc8486fd10d894cf7699bb7c656b5fcc79715ab6d9855be14d5cea2b35804b2\"" May 13 00:15:11.527414 env[1212]: time="2025-05-13T00:15:11.527380675Z" level=info msg="StartContainer for \"7cc8486fd10d894cf7699bb7c656b5fcc79715ab6d9855be14d5cea2b35804b2\"" May 13 00:15:11.531583 env[1212]: time="2025-05-13T00:15:11.530741904Z" level=info msg="CreateContainer within sandbox \"c093456bc7f93e61a142b51ca0dafce3c9084558a9a9b3fb8be29d064784b509\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c9c7d307ec7664b3a33d04a2ec4a40ff49723a5aa286540a36e27500339198e6\"" May 13 00:15:11.531583 env[1212]: time="2025-05-13T00:15:11.531526011Z" level=info msg="StartContainer for \"c9c7d307ec7664b3a33d04a2ec4a40ff49723a5aa286540a36e27500339198e6\"" May 13 00:15:11.531046 systemd[1]: Started cri-containerd-fe4d249b0064c7e6c1239a156471774ebc233b385f2f2634e7b85cd6877c17e8.scope. May 13 00:15:11.557875 systemd[1]: Started cri-containerd-c9c7d307ec7664b3a33d04a2ec4a40ff49723a5aa286540a36e27500339198e6.scope. May 13 00:15:11.563049 systemd[1]: Started cri-containerd-7cc8486fd10d894cf7699bb7c656b5fcc79715ab6d9855be14d5cea2b35804b2.scope. May 13 00:15:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit: BPF prog-id=73 op=LOAD May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014fb38 a2=10 a3=0 items=0 ppid=1660 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665346432343962303036346337653663313233396131353634373137 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=1660 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665346432343962303036346337653663313233396131353634373137 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit: BPF prog-id=74 op=LOAD May 13 00:15:11.594000 audit[1784]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=1660 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665346432343962303036346337653663313233396131353634373137 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit: BPF prog-id=75 op=LOAD May 13 00:15:11.594000 audit[1784]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=1660 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665346432343962303036346337653663313233396131353634373137 May 13 00:15:11.594000 audit: BPF prog-id=75 op=UNLOAD May 13 00:15:11.594000 audit: BPF prog-id=74 op=UNLOAD May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.594000 audit: BPF prog-id=76 op=LOAD May 13 00:15:11.594000 audit[1784]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=1660 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665346432343962303036346337653663313233396131353634373137 May 13 00:15:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.597000 audit: BPF prog-id=77 op=LOAD May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1688 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633834383666643130643839346366373639396262376336353662 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1688 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633834383666643130643839346366373639396262376336353662 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit: BPF prog-id=78 op=LOAD May 13 00:15:11.598000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1688 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633834383666643130643839346366373639396262376336353662 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit: BPF prog-id=79 op=LOAD May 13 00:15:11.598000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1688 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633834383666643130643839346366373639396262376336353662 May 13 00:15:11.598000 audit: BPF prog-id=79 op=UNLOAD May 13 00:15:11.598000 audit: BPF prog-id=78 op=UNLOAD May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.598000 audit: BPF prog-id=80 op=LOAD May 13 00:15:11.598000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1688 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633834383666643130643839346366373639396262376336353662 May 13 00:15:11.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit: BPF prog-id=81 op=LOAD May 13 00:15:11.603000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1677 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339633764333037656337363634623361333364303461326563346134 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1677 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339633764333037656337363634623361333364303461326563346134 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit: BPF prog-id=82 op=LOAD May 13 00:15:11.603000 audit[1810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1677 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339633764333037656337363634623361333364303461326563346134 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.603000 audit: BPF prog-id=83 op=LOAD May 13 00:15:11.603000 audit[1810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1677 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339633764333037656337363634623361333364303461326563346134 May 13 00:15:11.604000 audit: BPF prog-id=83 op=UNLOAD May 13 00:15:11.604000 audit: BPF prog-id=82 op=UNLOAD May 13 00:15:11.604000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.604000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.604000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.604000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.604000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.604000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.604000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.604000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.604000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.604000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:11.604000 audit: BPF prog-id=84 op=LOAD May 13 00:15:11.604000 audit[1810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1677 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:11.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339633764333037656337363634623361333364303461326563346134 May 13 00:15:11.635856 env[1212]: time="2025-05-13T00:15:11.635786678Z" level=info msg="StartContainer for \"fe4d249b0064c7e6c1239a156471774ebc233b385f2f2634e7b85cd6877c17e8\" returns successfully" May 13 00:15:11.637009 env[1212]: time="2025-05-13T00:15:11.636964521Z" level=info msg="StartContainer for \"7cc8486fd10d894cf7699bb7c656b5fcc79715ab6d9855be14d5cea2b35804b2\" returns successfully" May 13 00:15:11.661647 env[1212]: time="2025-05-13T00:15:11.656645098Z" level=info msg="StartContainer for \"c9c7d307ec7664b3a33d04a2ec4a40ff49723a5aa286540a36e27500339198e6\" returns successfully" May 13 00:15:11.681785 kubelet[1613]: E0513 00:15:11.681727 1613 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.7:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.7:6443: connect: connection refused" interval="1.6s" May 13 00:15:11.775065 kubelet[1613]: W0513 00:15:11.774950 1613 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.7:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused May 13 00:15:11.775065 kubelet[1613]: E0513 00:15:11.775020 1613 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.7:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.7:6443: connect: connection refused" logger="UnhandledError" May 13 00:15:11.903401 kubelet[1613]: I0513 00:15:11.903300 1613 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:15:12.309660 kubelet[1613]: E0513 00:15:12.309559 1613 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:12.311022 kubelet[1613]: E0513 00:15:12.310999 1613 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:12.311937 kubelet[1613]: E0513 00:15:12.311918 1613 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:13.131000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.135095 kernel: kauditd_printk_skb: 561 callbacks suppressed May 13 00:15:13.135166 kernel: audit: type=1400 audit(1747095313.131:558): avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.135185 kernel: audit: type=1300 audit(1747095313.131:558): arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000640390 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:15:13.131000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000640390 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:15:13.131000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:15:13.140591 kernel: audit: type=1327 audit(1747095313.131:558): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:15:13.140629 kernel: audit: type=1400 audit(1747095313.132:559): avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.132000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.132000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000480f20 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:15:13.145819 kernel: audit: type=1300 audit(1747095313.132:559): arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000480f20 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:15:13.145859 kernel: audit: type=1327 audit(1747095313.132:559): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:15:13.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:15:13.314177 kubelet[1613]: E0513 00:15:13.314149 1613 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:13.359000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.359000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4005e2dc50 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:15:13.365568 kernel: audit: type=1400 audit(1747095313.359:560): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.365614 kernel: audit: type=1300 audit(1747095313.359:560): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4005e2dc50 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:15:13.359000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:15:13.368271 kernel: audit: type=1327 audit(1747095313.359:560): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:15:13.359000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.370862 kernel: audit: type=1400 audit(1747095313.359:561): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.359000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4005e2dcb0 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:15:13.359000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:15:13.365000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.365000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4003dc4480 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:15:13.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:15:13.367000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.367000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4005b4c4a0 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:15:13.367000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:15:13.403673 kubelet[1613]: E0513 00:15:13.403567 1613 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 13 00:15:13.408000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.408000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40068ec860 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:15:13.408000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:15:13.408000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:13.408000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4005743dd0 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:15:13.408000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:15:13.488301 kubelet[1613]: I0513 00:15:13.488258 1613 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 13 00:15:13.488301 kubelet[1613]: E0513 00:15:13.488297 1613 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 13 00:15:14.258941 kubelet[1613]: I0513 00:15:14.258909 1613 apiserver.go:52] "Watching apiserver" May 13 00:15:14.278932 kubelet[1613]: I0513 00:15:14.278898 1613 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 13 00:15:15.382641 systemd[1]: Reloading. May 13 00:15:15.437912 /usr/lib/systemd/system-generators/torcx-generator[1909]: time="2025-05-13T00:15:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:15:15.437947 /usr/lib/systemd/system-generators/torcx-generator[1909]: time="2025-05-13T00:15:15Z" level=info msg="torcx already run" May 13 00:15:15.503030 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:15:15.503048 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:15:15.518707 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:15:15.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.583000 audit: BPF prog-id=85 op=LOAD May 13 00:15:15.583000 audit: BPF prog-id=77 op=UNLOAD May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit: BPF prog-id=86 op=LOAD May 13 00:15:15.584000 audit: BPF prog-id=46 op=UNLOAD May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit: BPF prog-id=87 op=LOAD May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.584000 audit: BPF prog-id=88 op=LOAD May 13 00:15:15.584000 audit: BPF prog-id=47 op=UNLOAD May 13 00:15:15.584000 audit: BPF prog-id=48 op=UNLOAD May 13 00:15:15.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.585000 audit: BPF prog-id=89 op=LOAD May 13 00:15:15.585000 audit: BPF prog-id=49 op=UNLOAD May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit: BPF prog-id=90 op=LOAD May 13 00:15:15.587000 audit: BPF prog-id=50 op=UNLOAD May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit: BPF prog-id=91 op=LOAD May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.587000 audit: BPF prog-id=92 op=LOAD May 13 00:15:15.587000 audit: BPF prog-id=51 op=UNLOAD May 13 00:15:15.587000 audit: BPF prog-id=52 op=UNLOAD May 13 00:15:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit: BPF prog-id=93 op=LOAD May 13 00:15:15.588000 audit: BPF prog-id=53 op=UNLOAD May 13 00:15:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.589000 audit: BPF prog-id=94 op=LOAD May 13 00:15:15.589000 audit: BPF prog-id=69 op=UNLOAD May 13 00:15:15.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit: BPF prog-id=95 op=LOAD May 13 00:15:15.590000 audit: BPF prog-id=81 op=UNLOAD May 13 00:15:15.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.591000 audit: BPF prog-id=96 op=LOAD May 13 00:15:15.591000 audit: BPF prog-id=65 op=UNLOAD May 13 00:15:15.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit: BPF prog-id=97 op=LOAD May 13 00:15:15.592000 audit: BPF prog-id=54 op=UNLOAD May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit: BPF prog-id=98 op=LOAD May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit: BPF prog-id=99 op=LOAD May 13 00:15:15.592000 audit: BPF prog-id=55 op=UNLOAD May 13 00:15:15.592000 audit: BPF prog-id=56 op=UNLOAD May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit: BPF prog-id=100 op=LOAD May 13 00:15:15.592000 audit: BPF prog-id=57 op=UNLOAD May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit: BPF prog-id=101 op=LOAD May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.592000 audit: BPF prog-id=102 op=LOAD May 13 00:15:15.592000 audit: BPF prog-id=58 op=UNLOAD May 13 00:15:15.592000 audit: BPF prog-id=59 op=UNLOAD May 13 00:15:15.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit: BPF prog-id=103 op=LOAD May 13 00:15:15.593000 audit: BPF prog-id=61 op=UNLOAD May 13 00:15:15.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.593000 audit: BPF prog-id=104 op=LOAD May 13 00:15:15.593000 audit: BPF prog-id=73 op=UNLOAD May 13 00:15:15.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.594000 audit: BPF prog-id=105 op=LOAD May 13 00:15:15.594000 audit: BPF prog-id=60 op=UNLOAD May 13 00:15:15.609397 systemd[1]: Stopping kubelet.service... May 13 00:15:15.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:15.637534 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:15:15.637729 systemd[1]: Stopped kubelet.service. May 13 00:15:15.637786 systemd[1]: kubelet.service: Consumed 1.216s CPU time. May 13 00:15:15.639611 systemd[1]: Starting kubelet.service... May 13 00:15:15.727259 systemd[1]: Started kubelet.service. May 13 00:15:15.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:15.767872 kubelet[1951]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:15:15.767872 kubelet[1951]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:15:15.767872 kubelet[1951]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:15:15.768344 kubelet[1951]: I0513 00:15:15.767927 1951 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:15:15.778622 kubelet[1951]: I0513 00:15:15.778571 1951 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 13 00:15:15.778622 kubelet[1951]: I0513 00:15:15.778613 1951 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:15:15.779038 kubelet[1951]: I0513 00:15:15.778892 1951 server.go:929] "Client rotation is on, will bootstrap in background" May 13 00:15:15.780581 kubelet[1951]: I0513 00:15:15.780559 1951 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 13 00:15:15.783012 kubelet[1951]: I0513 00:15:15.782981 1951 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:15:15.786896 kubelet[1951]: E0513 00:15:15.786866 1951 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:15:15.786896 kubelet[1951]: I0513 00:15:15.786897 1951 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:15:15.790520 kubelet[1951]: I0513 00:15:15.789766 1951 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:15:15.790520 kubelet[1951]: I0513 00:15:15.789919 1951 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 13 00:15:15.790520 kubelet[1951]: I0513 00:15:15.790036 1951 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:15:15.790520 kubelet[1951]: I0513 00:15:15.790062 1951 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:15:15.792310 kubelet[1951]: I0513 00:15:15.790292 1951 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:15:15.792310 kubelet[1951]: I0513 00:15:15.790313 1951 container_manager_linux.go:300] "Creating device plugin manager" May 13 00:15:15.792310 kubelet[1951]: I0513 00:15:15.790345 1951 state_mem.go:36] "Initialized new in-memory state store" May 13 00:15:15.792310 kubelet[1951]: I0513 00:15:15.790472 1951 kubelet.go:408] "Attempting to sync node with API server" May 13 00:15:15.792310 kubelet[1951]: I0513 00:15:15.790486 1951 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:15:15.792310 kubelet[1951]: I0513 00:15:15.790508 1951 kubelet.go:314] "Adding apiserver pod source" May 13 00:15:15.792310 kubelet[1951]: I0513 00:15:15.790733 1951 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:15:15.798086 kubelet[1951]: I0513 00:15:15.793461 1951 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:15:15.798086 kubelet[1951]: I0513 00:15:15.794193 1951 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:15:15.798086 kubelet[1951]: I0513 00:15:15.795067 1951 server.go:1269] "Started kubelet" May 13 00:15:15.798000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.798000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:15:15.798000 audit[1951]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ca3470 a1=40006aca50 a2=4000ca3440 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:15.798000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:15:15.798000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.798000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:15:15.798000 audit[1951]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40000bd800 a1=40006aca68 a2=4000ca3500 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:15.798000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:15:15.800948 kubelet[1951]: I0513 00:15:15.799998 1951 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:15:15.800948 kubelet[1951]: I0513 00:15:15.800038 1951 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:15:15.800948 kubelet[1951]: I0513 00:15:15.800076 1951 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:15:15.802201 kubelet[1951]: I0513 00:15:15.802169 1951 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:15:15.803858 kubelet[1951]: I0513 00:15:15.803823 1951 volume_manager.go:289] "Starting Kubelet Volume Manager" May 13 00:15:15.804102 kubelet[1951]: E0513 00:15:15.804073 1951 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:15:15.804712 kubelet[1951]: I0513 00:15:15.804687 1951 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 13 00:15:15.804843 kubelet[1951]: I0513 00:15:15.804827 1951 reconciler.go:26] "Reconciler: start to sync state" May 13 00:15:15.813737 kubelet[1951]: I0513 00:15:15.813683 1951 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:15:15.813986 kubelet[1951]: I0513 00:15:15.813929 1951 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:15:15.814256 kubelet[1951]: I0513 00:15:15.814237 1951 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:15:15.814608 kubelet[1951]: I0513 00:15:15.814568 1951 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:15:15.815451 kubelet[1951]: I0513 00:15:15.814578 1951 server.go:460] "Adding debug handlers to kubelet server" May 13 00:15:15.816243 kubelet[1951]: E0513 00:15:15.816186 1951 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:15:15.817169 kubelet[1951]: I0513 00:15:15.817140 1951 factory.go:221] Registration of the containerd container factory successfully May 13 00:15:15.817169 kubelet[1951]: I0513 00:15:15.817164 1951 factory.go:221] Registration of the systemd container factory successfully May 13 00:15:15.826816 kubelet[1951]: I0513 00:15:15.826768 1951 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:15:15.827732 kubelet[1951]: I0513 00:15:15.827706 1951 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:15:15.827732 kubelet[1951]: I0513 00:15:15.827731 1951 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:15:15.827810 kubelet[1951]: I0513 00:15:15.827753 1951 kubelet.go:2321] "Starting kubelet main sync loop" May 13 00:15:15.827810 kubelet[1951]: E0513 00:15:15.827795 1951 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:15:15.860008 kubelet[1951]: I0513 00:15:15.859981 1951 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:15:15.860274 kubelet[1951]: I0513 00:15:15.860253 1951 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:15:15.860359 kubelet[1951]: I0513 00:15:15.860283 1951 state_mem.go:36] "Initialized new in-memory state store" May 13 00:15:15.860447 kubelet[1951]: I0513 00:15:15.860433 1951 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 13 00:15:15.860486 kubelet[1951]: I0513 00:15:15.860448 1951 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 13 00:15:15.860486 kubelet[1951]: I0513 00:15:15.860465 1951 policy_none.go:49] "None policy: Start" May 13 00:15:15.861115 kubelet[1951]: I0513 00:15:15.861082 1951 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:15:15.861115 kubelet[1951]: I0513 00:15:15.861108 1951 state_mem.go:35] "Initializing new in-memory state store" May 13 00:15:15.861374 kubelet[1951]: I0513 00:15:15.861359 1951 state_mem.go:75] "Updated machine memory state" May 13 00:15:15.867106 kubelet[1951]: I0513 00:15:15.867082 1951 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:15:15.866000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:15.866000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:15:15.866000 audit[1951]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001020c00 a1=4000c75b90 a2=4001020bd0 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:15.866000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:15:15.867699 kubelet[1951]: I0513 00:15:15.867583 1951 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:15:15.867865 kubelet[1951]: I0513 00:15:15.867851 1951 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:15:15.867903 kubelet[1951]: I0513 00:15:15.867867 1951 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:15:15.868297 kubelet[1951]: I0513 00:15:15.868279 1951 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:15:15.971182 kubelet[1951]: I0513 00:15:15.971085 1951 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:15:15.977982 kubelet[1951]: I0513 00:15:15.977939 1951 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 13 00:15:15.978110 kubelet[1951]: I0513 00:15:15.978035 1951 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 13 00:15:16.107144 kubelet[1951]: I0513 00:15:16.106965 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3332f35c34cfb9cc1d390239dc9cec23-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"3332f35c34cfb9cc1d390239dc9cec23\") " pod="kube-system/kube-apiserver-localhost" May 13 00:15:16.107144 kubelet[1951]: I0513 00:15:16.107011 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3332f35c34cfb9cc1d390239dc9cec23-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"3332f35c34cfb9cc1d390239dc9cec23\") " pod="kube-system/kube-apiserver-localhost" May 13 00:15:16.107144 kubelet[1951]: I0513 00:15:16.107032 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:15:16.107144 kubelet[1951]: I0513 00:15:16.107049 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 13 00:15:16.107144 kubelet[1951]: I0513 00:15:16.107066 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3332f35c34cfb9cc1d390239dc9cec23-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"3332f35c34cfb9cc1d390239dc9cec23\") " pod="kube-system/kube-apiserver-localhost" May 13 00:15:16.107413 kubelet[1951]: I0513 00:15:16.107087 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:15:16.107413 kubelet[1951]: I0513 00:15:16.107102 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:15:16.107413 kubelet[1951]: I0513 00:15:16.107118 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:15:16.107413 kubelet[1951]: I0513 00:15:16.107138 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:15:16.239789 kubelet[1951]: E0513 00:15:16.238481 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:16.239789 kubelet[1951]: E0513 00:15:16.238840 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:16.239789 kubelet[1951]: E0513 00:15:16.238936 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:16.791722 kubelet[1951]: I0513 00:15:16.791683 1951 apiserver.go:52] "Watching apiserver" May 13 00:15:16.805035 kubelet[1951]: I0513 00:15:16.804990 1951 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 13 00:15:16.847413 kubelet[1951]: E0513 00:15:16.847363 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:16.847864 kubelet[1951]: E0513 00:15:16.847840 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:16.848560 kubelet[1951]: E0513 00:15:16.848085 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:16.867439 kubelet[1951]: I0513 00:15:16.867372 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.867357468 podStartE2EDuration="1.867357468s" podCreationTimestamp="2025-05-13 00:15:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:15:16.867113879 +0000 UTC m=+1.136357677" watchObservedRunningTime="2025-05-13 00:15:16.867357468 +0000 UTC m=+1.136601266" May 13 00:15:16.883947 kubelet[1951]: I0513 00:15:16.883866 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.883847995 podStartE2EDuration="1.883847995s" podCreationTimestamp="2025-05-13 00:15:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:15:16.874910208 +0000 UTC m=+1.144154006" watchObservedRunningTime="2025-05-13 00:15:16.883847995 +0000 UTC m=+1.153091833" May 13 00:15:16.884108 kubelet[1951]: I0513 00:15:16.883969 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.88395442 podStartE2EDuration="1.88395442s" podCreationTimestamp="2025-05-13 00:15:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:15:16.883663242 +0000 UTC m=+1.152907040" watchObservedRunningTime="2025-05-13 00:15:16.88395442 +0000 UTC m=+1.153198218" May 13 00:15:17.848850 kubelet[1951]: E0513 00:15:17.848813 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:18.850648 kubelet[1951]: E0513 00:15:18.850615 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:18.996000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:15:18.998470 kernel: kauditd_printk_skb: 272 callbacks suppressed May 13 00:15:18.998543 kernel: audit: type=1400 audit(1747095318.996:815): avc: denied { watch } for pid=1836 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:15:18.996000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400135d440 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:15:19.003904 kernel: audit: type=1300 audit(1747095318.996:815): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400135d440 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:15:19.003948 kernel: audit: type=1327 audit(1747095318.996:815): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:15:18.996000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:15:19.543521 kubelet[1951]: E0513 00:15:19.543479 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:20.422600 kubelet[1951]: E0513 00:15:20.422565 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:20.729000 audit[1347]: USER_END pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:15:20.730765 sudo[1347]: pam_unix(sudo:session): session closed for user root May 13 00:15:20.730000 audit[1347]: CRED_DISP pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:15:20.733688 sshd[1343]: pam_unix(sshd:session): session closed for user core May 13 00:15:20.735317 kernel: audit: type=1106 audit(1747095320.729:816): pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:15:20.735379 kernel: audit: type=1104 audit(1747095320.730:817): pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:15:20.734000 audit[1343]: USER_END pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:20.737746 systemd[1]: sshd@6-10.0.0.7:22-10.0.0.1:53724.service: Deactivated successfully. May 13 00:15:20.738466 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:15:20.738615 systemd[1]: session-7.scope: Consumed 7.373s CPU time. May 13 00:15:20.738839 kernel: audit: type=1106 audit(1747095320.734:818): pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:20.735000 audit[1343]: CRED_DISP pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:20.741588 kernel: audit: type=1104 audit(1747095320.735:819): pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:20.741724 systemd-logind[1198]: Session 7 logged out. Waiting for processes to exit. May 13 00:15:20.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.7:22-10.0.0.1:53724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:20.744320 kernel: audit: type=1131 audit(1747095320.736:820): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.7:22-10.0.0.1:53724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:20.745367 systemd-logind[1198]: Removed session 7. May 13 00:15:20.796000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:20.796000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000167ba0 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:15:20.802917 kernel: audit: type=1400 audit(1747095320.796:821): avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:20.803003 kernel: audit: type=1300 audit(1747095320.796:821): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000167ba0 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:15:20.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:15:20.796000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:20.796000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000167fa0 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:15:20.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:15:20.797000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:20.797000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000a84180 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:15:20.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:15:20.797000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:15:20.797000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000a84340 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:15:20.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:15:20.897581 kubelet[1951]: I0513 00:15:20.897543 1951 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 13 00:15:20.897860 env[1212]: time="2025-05-13T00:15:20.897825264Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:15:20.898155 kubelet[1951]: I0513 00:15:20.897987 1951 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 13 00:15:21.667984 systemd[1]: Created slice kubepods-besteffort-podfdfac500_60d7_4c4a_bb10_2fe2019d0b45.slice. May 13 00:15:21.746202 kubelet[1951]: I0513 00:15:21.746160 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fdfac500-60d7-4c4a-bb10-2fe2019d0b45-lib-modules\") pod \"kube-proxy-r7p6r\" (UID: \"fdfac500-60d7-4c4a-bb10-2fe2019d0b45\") " pod="kube-system/kube-proxy-r7p6r" May 13 00:15:21.746599 kubelet[1951]: I0513 00:15:21.746576 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qzqmg\" (UniqueName: \"kubernetes.io/projected/fdfac500-60d7-4c4a-bb10-2fe2019d0b45-kube-api-access-qzqmg\") pod \"kube-proxy-r7p6r\" (UID: \"fdfac500-60d7-4c4a-bb10-2fe2019d0b45\") " pod="kube-system/kube-proxy-r7p6r" May 13 00:15:21.746688 kubelet[1951]: I0513 00:15:21.746674 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/fdfac500-60d7-4c4a-bb10-2fe2019d0b45-kube-proxy\") pod \"kube-proxy-r7p6r\" (UID: \"fdfac500-60d7-4c4a-bb10-2fe2019d0b45\") " pod="kube-system/kube-proxy-r7p6r" May 13 00:15:21.746790 kubelet[1951]: I0513 00:15:21.746777 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fdfac500-60d7-4c4a-bb10-2fe2019d0b45-xtables-lock\") pod \"kube-proxy-r7p6r\" (UID: \"fdfac500-60d7-4c4a-bb10-2fe2019d0b45\") " pod="kube-system/kube-proxy-r7p6r" May 13 00:15:21.856582 kubelet[1951]: I0513 00:15:21.856535 1951 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 00:15:21.978461 kubelet[1951]: E0513 00:15:21.978327 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:21.979515 env[1212]: time="2025-05-13T00:15:21.979076323Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r7p6r,Uid:fdfac500-60d7-4c4a-bb10-2fe2019d0b45,Namespace:kube-system,Attempt:0,}" May 13 00:15:21.994380 env[1212]: time="2025-05-13T00:15:21.994316300Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:21.994503 env[1212]: time="2025-05-13T00:15:21.994401303Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:21.994503 env[1212]: time="2025-05-13T00:15:21.994430958Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:21.994614 env[1212]: time="2025-05-13T00:15:21.994580513Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/768ee61d47199b8fb0bdadd9892a26bf176c9f1f772ef6e00f8bf44ed1b1391f pid=2045 runtime=io.containerd.runc.v2 May 13 00:15:22.017170 systemd[1]: run-containerd-runc-k8s.io-768ee61d47199b8fb0bdadd9892a26bf176c9f1f772ef6e00f8bf44ed1b1391f-runc.SlgBUQ.mount: Deactivated successfully. May 13 00:15:22.021778 systemd[1]: Started cri-containerd-768ee61d47199b8fb0bdadd9892a26bf176c9f1f772ef6e00f8bf44ed1b1391f.scope. May 13 00:15:22.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit: BPF prog-id=106 op=LOAD May 13 00:15:22.046000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2045 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736386565363164343731393962386662306264616464393839326132 May 13 00:15:22.046000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2045 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736386565363164343731393962386662306264616464393839326132 May 13 00:15:22.046000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.046000 audit: BPF prog-id=107 op=LOAD May 13 00:15:22.046000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2045 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736386565363164343731393962386662306264616464393839326132 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit: BPF prog-id=108 op=LOAD May 13 00:15:22.047000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2045 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736386565363164343731393962386662306264616464393839326132 May 13 00:15:22.047000 audit: BPF prog-id=108 op=UNLOAD May 13 00:15:22.047000 audit: BPF prog-id=107 op=UNLOAD May 13 00:15:22.047000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.047000 audit: BPF prog-id=109 op=LOAD May 13 00:15:22.047000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2045 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736386565363164343731393962386662306264616464393839326132 May 13 00:15:22.052456 systemd[1]: Created slice kubepods-besteffort-podfbe9259c_0efd_499b_a7ed_6c569c3f32fb.slice. May 13 00:15:22.072194 env[1212]: time="2025-05-13T00:15:22.072151252Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r7p6r,Uid:fdfac500-60d7-4c4a-bb10-2fe2019d0b45,Namespace:kube-system,Attempt:0,} returns sandbox id \"768ee61d47199b8fb0bdadd9892a26bf176c9f1f772ef6e00f8bf44ed1b1391f\"" May 13 00:15:22.073137 kubelet[1951]: E0513 00:15:22.073099 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:22.077132 env[1212]: time="2025-05-13T00:15:22.077096644Z" level=info msg="CreateContainer within sandbox \"768ee61d47199b8fb0bdadd9892a26bf176c9f1f772ef6e00f8bf44ed1b1391f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:15:22.089109 env[1212]: time="2025-05-13T00:15:22.089044884Z" level=info msg="CreateContainer within sandbox \"768ee61d47199b8fb0bdadd9892a26bf176c9f1f772ef6e00f8bf44ed1b1391f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"44706efd09cb1d847e720215abf8d022326c97b4b20ca633dd7731a6f7db3bca\"" May 13 00:15:22.089877 env[1212]: time="2025-05-13T00:15:22.089848226Z" level=info msg="StartContainer for \"44706efd09cb1d847e720215abf8d022326c97b4b20ca633dd7731a6f7db3bca\"" May 13 00:15:22.105311 systemd[1]: Started cri-containerd-44706efd09cb1d847e720215abf8d022326c97b4b20ca633dd7731a6f7db3bca.scope. May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2045 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434373036656664303963623164383437653732303231356162663864 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit: BPF prog-id=110 op=LOAD May 13 00:15:22.130000 audit[2084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2045 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434373036656664303963623164383437653732303231356162663864 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit: BPF prog-id=111 op=LOAD May 13 00:15:22.130000 audit[2084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2045 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434373036656664303963623164383437653732303231356162663864 May 13 00:15:22.130000 audit: BPF prog-id=111 op=UNLOAD May 13 00:15:22.130000 audit: BPF prog-id=110 op=UNLOAD May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.130000 audit: BPF prog-id=112 op=LOAD May 13 00:15:22.130000 audit[2084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2045 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434373036656664303963623164383437653732303231356162663864 May 13 00:15:22.147356 env[1212]: time="2025-05-13T00:15:22.147308305Z" level=info msg="StartContainer for \"44706efd09cb1d847e720215abf8d022326c97b4b20ca633dd7731a6f7db3bca\" returns successfully" May 13 00:15:22.148973 kubelet[1951]: I0513 00:15:22.148864 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fbe9259c-0efd-499b-a7ed-6c569c3f32fb-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-sgxck\" (UID: \"fbe9259c-0efd-499b-a7ed-6c569c3f32fb\") " pod="tigera-operator/tigera-operator-6f6897fdc5-sgxck" May 13 00:15:22.148973 kubelet[1951]: I0513 00:15:22.148899 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5mv6n\" (UniqueName: \"kubernetes.io/projected/fbe9259c-0efd-499b-a7ed-6c569c3f32fb-kube-api-access-5mv6n\") pod \"tigera-operator-6f6897fdc5-sgxck\" (UID: \"fbe9259c-0efd-499b-a7ed-6c569c3f32fb\") " pod="tigera-operator/tigera-operator-6f6897fdc5-sgxck" May 13 00:15:22.332000 audit[2147]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.332000 audit[2147]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd48ca290 a2=0 a3=1 items=0 ppid=2094 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:15:22.332000 audit[2148]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.332000 audit[2148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3d20f80 a2=0 a3=1 items=0 ppid=2094 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:15:22.336000 audit[2149]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.336000 audit[2149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff32319a0 a2=0 a3=1 items=0 ppid=2094 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:15:22.337000 audit[2150]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.337000 audit[2150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd52d9140 a2=0 a3=1 items=0 ppid=2094 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.337000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:15:22.337000 audit[2151]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.337000 audit[2151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe423fce0 a2=0 a3=1 items=0 ppid=2094 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:15:22.339000 audit[2152]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.339000 audit[2152]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5b70170 a2=0 a3=1 items=0 ppid=2094 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:15:22.355126 env[1212]: time="2025-05-13T00:15:22.355082889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-sgxck,Uid:fbe9259c-0efd-499b-a7ed-6c569c3f32fb,Namespace:tigera-operator,Attempt:0,}" May 13 00:15:22.370597 env[1212]: time="2025-05-13T00:15:22.370513305Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:22.370777 env[1212]: time="2025-05-13T00:15:22.370566490Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:22.370777 env[1212]: time="2025-05-13T00:15:22.370761543Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:22.371179 env[1212]: time="2025-05-13T00:15:22.371138602Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a7731220e10d404b3b9530af2c743a6eb7d168f6998357fc0ffcc7e9aa05478a pid=2161 runtime=io.containerd.runc.v2 May 13 00:15:22.382799 systemd[1]: Started cri-containerd-a7731220e10d404b3b9530af2c743a6eb7d168f6998357fc0ffcc7e9aa05478a.scope. May 13 00:15:22.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.406000 audit: BPF prog-id=113 op=LOAD May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373331323230653130643430346233623935333061663263373433 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373331323230653130643430346233623935333061663263373433 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit: BPF prog-id=114 op=LOAD May 13 00:15:22.407000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373331323230653130643430346233623935333061663263373433 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit: BPF prog-id=115 op=LOAD May 13 00:15:22.407000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373331323230653130643430346233623935333061663263373433 May 13 00:15:22.407000 audit: BPF prog-id=115 op=UNLOAD May 13 00:15:22.407000 audit: BPF prog-id=114 op=UNLOAD May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:22.407000 audit: BPF prog-id=116 op=LOAD May 13 00:15:22.407000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373331323230653130643430346233623935333061663263373433 May 13 00:15:22.425793 env[1212]: time="2025-05-13T00:15:22.425751567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-sgxck,Uid:fbe9259c-0efd-499b-a7ed-6c569c3f32fb,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a7731220e10d404b3b9530af2c743a6eb7d168f6998357fc0ffcc7e9aa05478a\"" May 13 00:15:22.428069 env[1212]: time="2025-05-13T00:15:22.427896827Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 13 00:15:22.435000 audit[2193]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.435000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc30b0f00 a2=0 a3=1 items=0 ppid=2094 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:15:22.437000 audit[2195]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.437000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffca4d63c0 a2=0 a3=1 items=0 ppid=2094 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:15:22.443000 audit[2198]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.443000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcdfa6390 a2=0 a3=1 items=0 ppid=2094 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:15:22.444000 audit[2199]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.444000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc012160 a2=0 a3=1 items=0 ppid=2094 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:15:22.446000 audit[2201]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.446000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff775ca30 a2=0 a3=1 items=0 ppid=2094 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:15:22.447000 audit[2202]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.447000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7e3d190 a2=0 a3=1 items=0 ppid=2094 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:15:22.450000 audit[2204]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.450000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcdac4f90 a2=0 a3=1 items=0 ppid=2094 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.450000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:15:22.453000 audit[2207]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.453000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcd766e00 a2=0 a3=1 items=0 ppid=2094 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:15:22.455000 audit[2208]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.455000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd90f23d0 a2=0 a3=1 items=0 ppid=2094 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:15:22.458000 audit[2210]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.458000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdb0d8fc0 a2=0 a3=1 items=0 ppid=2094 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:15:22.459000 audit[2211]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.459000 audit[2211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbcd0060 a2=0 a3=1 items=0 ppid=2094 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:15:22.462000 audit[2213]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.462000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdfba2850 a2=0 a3=1 items=0 ppid=2094 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:15:22.465000 audit[2216]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.465000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe00618c0 a2=0 a3=1 items=0 ppid=2094 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:15:22.468000 audit[2219]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.468000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe7e82c80 a2=0 a3=1 items=0 ppid=2094 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:15:22.470000 audit[2220]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.470000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff158f4d0 a2=0 a3=1 items=0 ppid=2094 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:15:22.472000 audit[2222]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.472000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc941f3a0 a2=0 a3=1 items=0 ppid=2094 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:15:22.475000 audit[2225]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.475000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffd4f57c0 a2=0 a3=1 items=0 ppid=2094 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:15:22.476000 audit[2226]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.476000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2ef9a20 a2=0 a3=1 items=0 ppid=2094 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:15:22.478000 audit[2228]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:15:22.478000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffd80d9470 a2=0 a3=1 items=0 ppid=2094 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:15:22.502000 audit[2234]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:22.502000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc6833b00 a2=0 a3=1 items=0 ppid=2094 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:22.513000 audit[2234]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:22.513000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffc6833b00 a2=0 a3=1 items=0 ppid=2094 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:22.515000 audit[2239]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.515000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd22d5c60 a2=0 a3=1 items=0 ppid=2094 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:15:22.517000 audit[2241]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.517000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffec6abdd0 a2=0 a3=1 items=0 ppid=2094 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.517000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:15:22.521000 audit[2244]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.521000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc4662cb0 a2=0 a3=1 items=0 ppid=2094 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:15:22.522000 audit[2245]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.522000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4fcd8f0 a2=0 a3=1 items=0 ppid=2094 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:15:22.524000 audit[2247]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.524000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd68b73d0 a2=0 a3=1 items=0 ppid=2094 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:15:22.525000 audit[2248]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.525000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc0801370 a2=0 a3=1 items=0 ppid=2094 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:15:22.529000 audit[2250]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.529000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc938ccc0 a2=0 a3=1 items=0 ppid=2094 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:15:22.533000 audit[2253]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.533000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffdac33bf0 a2=0 a3=1 items=0 ppid=2094 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:15:22.534000 audit[2254]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.534000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe050ea30 a2=0 a3=1 items=0 ppid=2094 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:15:22.536000 audit[2256]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.536000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa8a1710 a2=0 a3=1 items=0 ppid=2094 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:15:22.537000 audit[2257]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.537000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd654a490 a2=0 a3=1 items=0 ppid=2094 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:15:22.539000 audit[2259]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.539000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcb37b780 a2=0 a3=1 items=0 ppid=2094 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:15:22.542000 audit[2262]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.542000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffecd358f0 a2=0 a3=1 items=0 ppid=2094 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:15:22.546000 audit[2265]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.546000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff5825fb0 a2=0 a3=1 items=0 ppid=2094 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:15:22.547000 audit[2266]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.547000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc8c4e360 a2=0 a3=1 items=0 ppid=2094 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.547000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:15:22.549000 audit[2268]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.549000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffeb777570 a2=0 a3=1 items=0 ppid=2094 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:15:22.552000 audit[2271]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.552000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc7baeda0 a2=0 a3=1 items=0 ppid=2094 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:15:22.553000 audit[2272]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.553000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3272110 a2=0 a3=1 items=0 ppid=2094 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:15:22.555000 audit[2274]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.555000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc3ad3fb0 a2=0 a3=1 items=0 ppid=2094 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:15:22.556000 audit[2275]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.556000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc0f383d0 a2=0 a3=1 items=0 ppid=2094 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:15:22.559000 audit[2277]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.559000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd0c18d40 a2=0 a3=1 items=0 ppid=2094 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:15:22.562000 audit[2280]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:15:22.562000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcd5eff40 a2=0 a3=1 items=0 ppid=2094 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:15:22.565000 audit[2282]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:15:22.565000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffd01065c0 a2=0 a3=1 items=0 ppid=2094 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.565000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:22.565000 audit[2282]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:15:22.565000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffd01065c0 a2=0 a3=1 items=0 ppid=2094 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:22.565000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:22.857730 kubelet[1951]: E0513 00:15:22.857701 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:22.868460 kubelet[1951]: I0513 00:15:22.868391 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-r7p6r" podStartSLOduration=1.868374567 podStartE2EDuration="1.868374567s" podCreationTimestamp="2025-05-13 00:15:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:15:22.868294689 +0000 UTC m=+7.137538487" watchObservedRunningTime="2025-05-13 00:15:22.868374567 +0000 UTC m=+7.137618365" May 13 00:15:23.552151 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3732800251.mount: Deactivated successfully. May 13 00:15:24.250641 env[1212]: time="2025-05-13T00:15:24.250589162Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:24.252137 env[1212]: time="2025-05-13T00:15:24.252106129Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:24.253967 env[1212]: time="2025-05-13T00:15:24.253933188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:24.255353 env[1212]: time="2025-05-13T00:15:24.255328263Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:24.255971 env[1212]: time="2025-05-13T00:15:24.255946927Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 13 00:15:24.258387 env[1212]: time="2025-05-13T00:15:24.258336786Z" level=info msg="CreateContainer within sandbox \"a7731220e10d404b3b9530af2c743a6eb7d168f6998357fc0ffcc7e9aa05478a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 13 00:15:24.272593 env[1212]: time="2025-05-13T00:15:24.272543883Z" level=info msg="CreateContainer within sandbox \"a7731220e10d404b3b9530af2c743a6eb7d168f6998357fc0ffcc7e9aa05478a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"c7252cc34621eeaec621ed013c206e2c26cd9fc8732e95f45bb53ea678859f5b\"" May 13 00:15:24.273260 env[1212]: time="2025-05-13T00:15:24.273211008Z" level=info msg="StartContainer for \"c7252cc34621eeaec621ed013c206e2c26cd9fc8732e95f45bb53ea678859f5b\"" May 13 00:15:24.306390 systemd[1]: Started cri-containerd-c7252cc34621eeaec621ed013c206e2c26cd9fc8732e95f45bb53ea678859f5b.scope. May 13 00:15:24.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.327433 kernel: kauditd_printk_skb: 320 callbacks suppressed May 13 00:15:24.327473 kernel: audit: type=1400 audit(1747095324.325:918): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.331197 kernel: audit: type=1400 audit(1747095324.325:919): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.333276 kernel: audit: type=1400 audit(1747095324.325:920): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.335318 kernel: audit: type=1400 audit(1747095324.325:921): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.335367 kernel: audit: type=1400 audit(1747095324.325:922): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.337110 kernel: audit: type=1400 audit(1747095324.325:923): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.340810 kernel: audit: type=1400 audit(1747095324.325:924): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.340893 kernel: audit: type=1400 audit(1747095324.325:925): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.342796 kernel: audit: type=1400 audit(1747095324.325:926): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.344419 kernel: audit: type=1400 audit(1747095324.326:927): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit: BPF prog-id=117 op=LOAD May 13 00:15:24.326000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[2291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2161 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:24.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337323532636333343632316565616563363231656430313363323036 May 13 00:15:24.326000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[2291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2161 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:24.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337323532636333343632316565616563363231656430313363323036 May 13 00:15:24.326000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.326000 audit: BPF prog-id=118 op=LOAD May 13 00:15:24.326000 audit[2291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2161 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:24.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337323532636333343632316565616563363231656430313363323036 May 13 00:15:24.328000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.328000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.328000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.328000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.328000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.328000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.328000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.328000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.328000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.328000 audit: BPF prog-id=119 op=LOAD May 13 00:15:24.328000 audit[2291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2161 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:24.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337323532636333343632316565616563363231656430313363323036 May 13 00:15:24.329000 audit: BPF prog-id=119 op=UNLOAD May 13 00:15:24.330000 audit: BPF prog-id=118 op=UNLOAD May 13 00:15:24.330000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.330000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.330000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.330000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.330000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.330000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.330000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.330000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.330000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.330000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:24.330000 audit: BPF prog-id=120 op=LOAD May 13 00:15:24.330000 audit[2291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2161 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:24.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337323532636333343632316565616563363231656430313363323036 May 13 00:15:24.377432 env[1212]: time="2025-05-13T00:15:24.377343406Z" level=info msg="StartContainer for \"c7252cc34621eeaec621ed013c206e2c26cd9fc8732e95f45bb53ea678859f5b\" returns successfully" May 13 00:15:25.270313 systemd[1]: run-containerd-runc-k8s.io-c7252cc34621eeaec621ed013c206e2c26cd9fc8732e95f45bb53ea678859f5b-runc.hJPU6N.mount: Deactivated successfully. May 13 00:15:27.734000 audit[2325]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:27.734000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffff86e4ef0 a2=0 a3=1 items=0 ppid=2094 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:27.734000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:27.742000 audit[2325]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:27.742000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff86e4ef0 a2=0 a3=1 items=0 ppid=2094 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:27.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:27.754000 audit[2327]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:27.754000 audit[2327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffdd7644e0 a2=0 a3=1 items=0 ppid=2094 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:27.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:27.760000 audit[2327]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:27.760000 audit[2327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdd7644e0 a2=0 a3=1 items=0 ppid=2094 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:27.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:28.062809 kubelet[1951]: E0513 00:15:28.062687 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:28.143908 kubelet[1951]: I0513 00:15:28.143830 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-sgxck" podStartSLOduration=4.313995701 podStartE2EDuration="6.143813743s" podCreationTimestamp="2025-05-13 00:15:22 +0000 UTC" firstStartedPulling="2025-05-13 00:15:22.427307507 +0000 UTC m=+6.696551305" lastFinishedPulling="2025-05-13 00:15:24.257125589 +0000 UTC m=+8.526369347" observedRunningTime="2025-05-13 00:15:24.87955685 +0000 UTC m=+9.148800648" watchObservedRunningTime="2025-05-13 00:15:28.143813743 +0000 UTC m=+12.413057541" May 13 00:15:28.304686 systemd[1]: Created slice kubepods-besteffort-pod3f99fc32_d7b3_4876_bbf9_ac02aeddead9.slice. May 13 00:15:28.369658 systemd[1]: Created slice kubepods-besteffort-podf9114711_2164_4786_98f5_e66cdb07deb9.slice. May 13 00:15:28.394547 kubelet[1951]: I0513 00:15:28.394509 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/3f99fc32-d7b3-4876-bbf9-ac02aeddead9-typha-certs\") pod \"calico-typha-57589fb575-2wjzk\" (UID: \"3f99fc32-d7b3-4876-bbf9-ac02aeddead9\") " pod="calico-system/calico-typha-57589fb575-2wjzk" May 13 00:15:28.394794 kubelet[1951]: I0513 00:15:28.394774 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3f99fc32-d7b3-4876-bbf9-ac02aeddead9-tigera-ca-bundle\") pod \"calico-typha-57589fb575-2wjzk\" (UID: \"3f99fc32-d7b3-4876-bbf9-ac02aeddead9\") " pod="calico-system/calico-typha-57589fb575-2wjzk" May 13 00:15:28.394890 kubelet[1951]: I0513 00:15:28.394876 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f9114711-2164-4786-98f5-e66cdb07deb9-flexvol-driver-host\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.395000 kubelet[1951]: I0513 00:15:28.394985 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f9114711-2164-4786-98f5-e66cdb07deb9-var-run-calico\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.395079 kubelet[1951]: I0513 00:15:28.395065 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t7kjh\" (UniqueName: \"kubernetes.io/projected/3f99fc32-d7b3-4876-bbf9-ac02aeddead9-kube-api-access-t7kjh\") pod \"calico-typha-57589fb575-2wjzk\" (UID: \"3f99fc32-d7b3-4876-bbf9-ac02aeddead9\") " pod="calico-system/calico-typha-57589fb575-2wjzk" May 13 00:15:28.395160 kubelet[1951]: I0513 00:15:28.395146 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f9114711-2164-4786-98f5-e66cdb07deb9-xtables-lock\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.395237 kubelet[1951]: I0513 00:15:28.395223 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f9114711-2164-4786-98f5-e66cdb07deb9-tigera-ca-bundle\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.395341 kubelet[1951]: I0513 00:15:28.395326 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f9114711-2164-4786-98f5-e66cdb07deb9-lib-modules\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.395438 kubelet[1951]: I0513 00:15:28.395424 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f9114711-2164-4786-98f5-e66cdb07deb9-node-certs\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.395513 kubelet[1951]: I0513 00:15:28.395501 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f9114711-2164-4786-98f5-e66cdb07deb9-var-lib-calico\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.395600 kubelet[1951]: I0513 00:15:28.395586 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-csmjv\" (UniqueName: \"kubernetes.io/projected/f9114711-2164-4786-98f5-e66cdb07deb9-kube-api-access-csmjv\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.395691 kubelet[1951]: I0513 00:15:28.395670 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f9114711-2164-4786-98f5-e66cdb07deb9-policysync\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.395771 kubelet[1951]: I0513 00:15:28.395758 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f9114711-2164-4786-98f5-e66cdb07deb9-cni-net-dir\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.395919 kubelet[1951]: I0513 00:15:28.395901 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f9114711-2164-4786-98f5-e66cdb07deb9-cni-log-dir\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.396013 kubelet[1951]: I0513 00:15:28.396000 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f9114711-2164-4786-98f5-e66cdb07deb9-cni-bin-dir\") pod \"calico-node-j7m72\" (UID: \"f9114711-2164-4786-98f5-e66cdb07deb9\") " pod="calico-system/calico-node-j7m72" May 13 00:15:28.480989 kubelet[1951]: E0513 00:15:28.480936 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wg7hs" podUID="44e13a95-a792-40e7-82f9-58a1c59c3031" May 13 00:15:28.497154 kubelet[1951]: I0513 00:15:28.497098 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/44e13a95-a792-40e7-82f9-58a1c59c3031-varrun\") pod \"csi-node-driver-wg7hs\" (UID: \"44e13a95-a792-40e7-82f9-58a1c59c3031\") " pod="calico-system/csi-node-driver-wg7hs" May 13 00:15:28.497154 kubelet[1951]: I0513 00:15:28.497138 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/44e13a95-a792-40e7-82f9-58a1c59c3031-registration-dir\") pod \"csi-node-driver-wg7hs\" (UID: \"44e13a95-a792-40e7-82f9-58a1c59c3031\") " pod="calico-system/csi-node-driver-wg7hs" May 13 00:15:28.497364 kubelet[1951]: I0513 00:15:28.497203 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/44e13a95-a792-40e7-82f9-58a1c59c3031-socket-dir\") pod \"csi-node-driver-wg7hs\" (UID: \"44e13a95-a792-40e7-82f9-58a1c59c3031\") " pod="calico-system/csi-node-driver-wg7hs" May 13 00:15:28.497364 kubelet[1951]: I0513 00:15:28.497236 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vnfpw\" (UniqueName: \"kubernetes.io/projected/44e13a95-a792-40e7-82f9-58a1c59c3031-kube-api-access-vnfpw\") pod \"csi-node-driver-wg7hs\" (UID: \"44e13a95-a792-40e7-82f9-58a1c59c3031\") " pod="calico-system/csi-node-driver-wg7hs" May 13 00:15:28.497364 kubelet[1951]: I0513 00:15:28.497263 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/44e13a95-a792-40e7-82f9-58a1c59c3031-kubelet-dir\") pod \"csi-node-driver-wg7hs\" (UID: \"44e13a95-a792-40e7-82f9-58a1c59c3031\") " pod="calico-system/csi-node-driver-wg7hs" May 13 00:15:28.497909 kubelet[1951]: E0513 00:15:28.497882 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.497909 kubelet[1951]: W0513 00:15:28.497904 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.498076 kubelet[1951]: E0513 00:15:28.498045 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.498385 kubelet[1951]: E0513 00:15:28.498360 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.498432 kubelet[1951]: W0513 00:15:28.498387 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.498432 kubelet[1951]: E0513 00:15:28.498407 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.501357 kubelet[1951]: E0513 00:15:28.501302 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.501357 kubelet[1951]: W0513 00:15:28.501345 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.501357 kubelet[1951]: E0513 00:15:28.501365 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.501634 kubelet[1951]: E0513 00:15:28.501614 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.501634 kubelet[1951]: W0513 00:15:28.501627 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.501710 kubelet[1951]: E0513 00:15:28.501650 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.501835 kubelet[1951]: E0513 00:15:28.501820 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.501835 kubelet[1951]: W0513 00:15:28.501832 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.501899 kubelet[1951]: E0513 00:15:28.501880 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.502075 kubelet[1951]: E0513 00:15:28.502059 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.502075 kubelet[1951]: W0513 00:15:28.502072 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.502141 kubelet[1951]: E0513 00:15:28.502110 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.502350 kubelet[1951]: E0513 00:15:28.502324 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.502350 kubelet[1951]: W0513 00:15:28.502346 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.502430 kubelet[1951]: E0513 00:15:28.502392 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.502783 kubelet[1951]: E0513 00:15:28.502762 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.502783 kubelet[1951]: W0513 00:15:28.502778 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.502873 kubelet[1951]: E0513 00:15:28.502845 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.502985 kubelet[1951]: E0513 00:15:28.502966 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.502985 kubelet[1951]: W0513 00:15:28.502981 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.503053 kubelet[1951]: E0513 00:15:28.503007 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.503142 kubelet[1951]: E0513 00:15:28.503124 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.503142 kubelet[1951]: W0513 00:15:28.503136 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.503231 kubelet[1951]: E0513 00:15:28.503159 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.503398 kubelet[1951]: E0513 00:15:28.503378 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.503398 kubelet[1951]: W0513 00:15:28.503394 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.503485 kubelet[1951]: E0513 00:15:28.503422 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.503587 kubelet[1951]: E0513 00:15:28.503569 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.503587 kubelet[1951]: W0513 00:15:28.503584 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.503649 kubelet[1951]: E0513 00:15:28.503606 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.504295 kubelet[1951]: E0513 00:15:28.504271 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.504295 kubelet[1951]: W0513 00:15:28.504289 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.504417 kubelet[1951]: E0513 00:15:28.504337 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.504504 kubelet[1951]: E0513 00:15:28.504484 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.504504 kubelet[1951]: W0513 00:15:28.504499 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.504584 kubelet[1951]: E0513 00:15:28.504568 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.504746 kubelet[1951]: E0513 00:15:28.504728 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.504746 kubelet[1951]: W0513 00:15:28.504742 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.504821 kubelet[1951]: E0513 00:15:28.504807 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.504922 kubelet[1951]: E0513 00:15:28.504904 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.504922 kubelet[1951]: W0513 00:15:28.504918 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.504995 kubelet[1951]: E0513 00:15:28.504982 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.507417 kubelet[1951]: E0513 00:15:28.507383 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.507417 kubelet[1951]: W0513 00:15:28.507407 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.507530 kubelet[1951]: E0513 00:15:28.507430 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.510345 kubelet[1951]: E0513 00:15:28.510307 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.510345 kubelet[1951]: W0513 00:15:28.510330 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.510451 kubelet[1951]: E0513 00:15:28.510370 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.513627 kubelet[1951]: E0513 00:15:28.513316 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.513627 kubelet[1951]: W0513 00:15:28.513349 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.513627 kubelet[1951]: E0513 00:15:28.513398 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.513627 kubelet[1951]: E0513 00:15:28.513563 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.513627 kubelet[1951]: W0513 00:15:28.513571 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.513627 kubelet[1951]: E0513 00:15:28.513601 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.520081 kubelet[1951]: E0513 00:15:28.519314 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.520081 kubelet[1951]: W0513 00:15:28.519351 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.520081 kubelet[1951]: E0513 00:15:28.519442 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.522334 kubelet[1951]: E0513 00:15:28.522302 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.522334 kubelet[1951]: W0513 00:15:28.522322 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.522474 kubelet[1951]: E0513 00:15:28.522426 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.526433 kubelet[1951]: E0513 00:15:28.526306 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.526433 kubelet[1951]: W0513 00:15:28.526325 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.526433 kubelet[1951]: E0513 00:15:28.526382 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.526603 kubelet[1951]: E0513 00:15:28.526568 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.526603 kubelet[1951]: W0513 00:15:28.526578 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.526652 kubelet[1951]: E0513 00:15:28.526612 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.526751 kubelet[1951]: E0513 00:15:28.526733 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.526751 kubelet[1951]: W0513 00:15:28.526744 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.526816 kubelet[1951]: E0513 00:15:28.526784 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.531598 kubelet[1951]: E0513 00:15:28.530327 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.531598 kubelet[1951]: W0513 00:15:28.530358 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.531598 kubelet[1951]: E0513 00:15:28.530398 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.534375 kubelet[1951]: E0513 00:15:28.534323 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.534375 kubelet[1951]: W0513 00:15:28.534367 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.534518 kubelet[1951]: E0513 00:15:28.534420 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.534634 kubelet[1951]: E0513 00:15:28.534613 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.534634 kubelet[1951]: W0513 00:15:28.534627 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.534689 kubelet[1951]: E0513 00:15:28.534657 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.538331 kubelet[1951]: E0513 00:15:28.538302 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.538331 kubelet[1951]: W0513 00:15:28.538324 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.538497 kubelet[1951]: E0513 00:15:28.538384 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.539063 kubelet[1951]: E0513 00:15:28.539032 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.539063 kubelet[1951]: W0513 00:15:28.539048 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.539159 kubelet[1951]: E0513 00:15:28.539088 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.539363 kubelet[1951]: E0513 00:15:28.539335 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.539363 kubelet[1951]: W0513 00:15:28.539357 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.539451 kubelet[1951]: E0513 00:15:28.539422 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.543414 kubelet[1951]: E0513 00:15:28.543376 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.543414 kubelet[1951]: W0513 00:15:28.543404 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.543557 kubelet[1951]: E0513 00:15:28.543526 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.545775 kubelet[1951]: E0513 00:15:28.545741 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.545849 kubelet[1951]: W0513 00:15:28.545792 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.546025 kubelet[1951]: E0513 00:15:28.545969 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.552822 kubelet[1951]: E0513 00:15:28.552787 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.552822 kubelet[1951]: W0513 00:15:28.552810 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.552984 kubelet[1951]: E0513 00:15:28.552864 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.553865 kubelet[1951]: E0513 00:15:28.553837 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.553865 kubelet[1951]: W0513 00:15:28.553854 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.553996 kubelet[1951]: E0513 00:15:28.553914 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.554232 kubelet[1951]: E0513 00:15:28.554207 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.554333 kubelet[1951]: W0513 00:15:28.554235 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.554333 kubelet[1951]: E0513 00:15:28.554249 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.598653 kubelet[1951]: E0513 00:15:28.598619 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.598653 kubelet[1951]: W0513 00:15:28.598642 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.598653 kubelet[1951]: E0513 00:15:28.598661 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.598943 kubelet[1951]: E0513 00:15:28.598909 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.598943 kubelet[1951]: W0513 00:15:28.598917 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.598943 kubelet[1951]: E0513 00:15:28.598932 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.599168 kubelet[1951]: E0513 00:15:28.599151 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.599235 kubelet[1951]: W0513 00:15:28.599169 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.599235 kubelet[1951]: E0513 00:15:28.599189 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.599457 kubelet[1951]: E0513 00:15:28.599443 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.599457 kubelet[1951]: W0513 00:15:28.599457 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.599538 kubelet[1951]: E0513 00:15:28.599474 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.599644 kubelet[1951]: E0513 00:15:28.599632 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.599644 kubelet[1951]: W0513 00:15:28.599644 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.599705 kubelet[1951]: E0513 00:15:28.599658 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.599840 kubelet[1951]: E0513 00:15:28.599829 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.599871 kubelet[1951]: W0513 00:15:28.599840 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.599871 kubelet[1951]: E0513 00:15:28.599856 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.600017 kubelet[1951]: E0513 00:15:28.600006 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.600054 kubelet[1951]: W0513 00:15:28.600018 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.600054 kubelet[1951]: E0513 00:15:28.600030 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.600184 kubelet[1951]: E0513 00:15:28.600172 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.600184 kubelet[1951]: W0513 00:15:28.600182 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.600265 kubelet[1951]: E0513 00:15:28.600239 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.600335 kubelet[1951]: E0513 00:15:28.600324 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.600335 kubelet[1951]: W0513 00:15:28.600333 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.600408 kubelet[1951]: E0513 00:15:28.600379 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.600487 kubelet[1951]: E0513 00:15:28.600476 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.600487 kubelet[1951]: W0513 00:15:28.600485 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.600544 kubelet[1951]: E0513 00:15:28.600498 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.600646 kubelet[1951]: E0513 00:15:28.600636 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.600646 kubelet[1951]: W0513 00:15:28.600646 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.600706 kubelet[1951]: E0513 00:15:28.600658 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.600799 kubelet[1951]: E0513 00:15:28.600788 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.600799 kubelet[1951]: W0513 00:15:28.600799 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.600857 kubelet[1951]: E0513 00:15:28.600808 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.600960 kubelet[1951]: E0513 00:15:28.600950 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.600960 kubelet[1951]: W0513 00:15:28.600959 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.601022 kubelet[1951]: E0513 00:15:28.600971 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.601323 kubelet[1951]: E0513 00:15:28.601307 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.601413 kubelet[1951]: W0513 00:15:28.601399 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.601482 kubelet[1951]: E0513 00:15:28.601470 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.601687 kubelet[1951]: E0513 00:15:28.601669 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.601687 kubelet[1951]: W0513 00:15:28.601684 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.601771 kubelet[1951]: E0513 00:15:28.601704 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.601871 kubelet[1951]: E0513 00:15:28.601856 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.601871 kubelet[1951]: W0513 00:15:28.601868 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.601976 kubelet[1951]: E0513 00:15:28.601958 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.602030 kubelet[1951]: E0513 00:15:28.602001 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.602093 kubelet[1951]: W0513 00:15:28.602080 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.602206 kubelet[1951]: E0513 00:15:28.602182 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.602431 kubelet[1951]: E0513 00:15:28.602417 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.602496 kubelet[1951]: W0513 00:15:28.602484 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.602565 kubelet[1951]: E0513 00:15:28.602552 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.602815 kubelet[1951]: E0513 00:15:28.602802 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.602897 kubelet[1951]: W0513 00:15:28.602884 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.602973 kubelet[1951]: E0513 00:15:28.602960 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.603197 kubelet[1951]: E0513 00:15:28.603184 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.603325 kubelet[1951]: W0513 00:15:28.603309 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.603432 kubelet[1951]: E0513 00:15:28.603409 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.603622 kubelet[1951]: E0513 00:15:28.603608 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.603708 kubelet[1951]: W0513 00:15:28.603694 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.603865 kubelet[1951]: E0513 00:15:28.603830 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.603970 kubelet[1951]: E0513 00:15:28.603957 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.604032 kubelet[1951]: W0513 00:15:28.604020 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.604119 kubelet[1951]: E0513 00:15:28.604099 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.607457 kubelet[1951]: E0513 00:15:28.607427 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:28.607607 kubelet[1951]: E0513 00:15:28.607590 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.608249 env[1212]: time="2025-05-13T00:15:28.607877867Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57589fb575-2wjzk,Uid:3f99fc32-d7b3-4876-bbf9-ac02aeddead9,Namespace:calico-system,Attempt:0,}" May 13 00:15:28.608518 kubelet[1951]: W0513 00:15:28.608267 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.608518 kubelet[1951]: E0513 00:15:28.608297 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.609371 kubelet[1951]: E0513 00:15:28.609347 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.609454 kubelet[1951]: W0513 00:15:28.609440 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.609534 kubelet[1951]: E0513 00:15:28.609520 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.610254 kubelet[1951]: E0513 00:15:28.610203 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.610329 kubelet[1951]: W0513 00:15:28.610248 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.610373 kubelet[1951]: E0513 00:15:28.610332 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.616937 kubelet[1951]: E0513 00:15:28.616913 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.616937 kubelet[1951]: W0513 00:15:28.616933 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.617047 kubelet[1951]: E0513 00:15:28.616950 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.632633 env[1212]: time="2025-05-13T00:15:28.632467318Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:28.632633 env[1212]: time="2025-05-13T00:15:28.632512654Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:28.632633 env[1212]: time="2025-05-13T00:15:28.632523377Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:28.633334 env[1212]: time="2025-05-13T00:15:28.633204653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1990910b7a187be0908bc81ce1c982ea0660e3ca47f239f259db048af77fd83e pid=2403 runtime=io.containerd.runc.v2 May 13 00:15:28.644838 systemd[1]: Started cri-containerd-1990910b7a187be0908bc81ce1c982ea0660e3ca47f239f259db048af77fd83e.scope. May 13 00:15:28.672552 kubelet[1951]: E0513 00:15:28.672522 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:28.673427 env[1212]: time="2025-05-13T00:15:28.673379965Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j7m72,Uid:f9114711-2164-4786-98f5-e66cdb07deb9,Namespace:calico-system,Attempt:0,}" May 13 00:15:28.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.673000 audit: BPF prog-id=121 op=LOAD May 13 00:15:28.673000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.673000 audit[2412]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2403 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393039313062376131383762653039303862633831636531633938 May 13 00:15:28.673000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.673000 audit[2412]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2403 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393039313062376131383762653039303862633831636531633938 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit: BPF prog-id=122 op=LOAD May 13 00:15:28.675000 audit[2412]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2403 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393039313062376131383762653039303862633831636531633938 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit: BPF prog-id=123 op=LOAD May 13 00:15:28.675000 audit[2412]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2403 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393039313062376131383762653039303862633831636531633938 May 13 00:15:28.675000 audit: BPF prog-id=123 op=UNLOAD May 13 00:15:28.675000 audit: BPF prog-id=122 op=UNLOAD May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.675000 audit: BPF prog-id=124 op=LOAD May 13 00:15:28.675000 audit[2412]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2403 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393039313062376131383762653039303862633831636531633938 May 13 00:15:28.696715 env[1212]: time="2025-05-13T00:15:28.696663926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57589fb575-2wjzk,Uid:3f99fc32-d7b3-4876-bbf9-ac02aeddead9,Namespace:calico-system,Attempt:0,} returns sandbox id \"1990910b7a187be0908bc81ce1c982ea0660e3ca47f239f259db048af77fd83e\"" May 13 00:15:28.697403 kubelet[1951]: E0513 00:15:28.697366 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:28.701172 env[1212]: time="2025-05-13T00:15:28.700860735Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 13 00:15:28.706314 env[1212]: time="2025-05-13T00:15:28.706151842Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:28.706737 env[1212]: time="2025-05-13T00:15:28.706287369Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:28.706737 env[1212]: time="2025-05-13T00:15:28.706298893Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:28.706737 env[1212]: time="2025-05-13T00:15:28.706467911Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/17362d46b4f7dc012ce8152e82171904533e433d0134b9ab9f40a0d55a31990d pid=2443 runtime=io.containerd.runc.v2 May 13 00:15:28.717523 systemd[1]: Started cri-containerd-17362d46b4f7dc012ce8152e82171904533e433d0134b9ab9f40a0d55a31990d.scope. May 13 00:15:28.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit: BPF prog-id=125 op=LOAD May 13 00:15:28.738000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2443 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137333632643436623466376463303132636538313532653832313731 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2443 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137333632643436623466376463303132636538313532653832313731 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit: BPF prog-id=126 op=LOAD May 13 00:15:28.738000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2443 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137333632643436623466376463303132636538313532653832313731 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.738000 audit: BPF prog-id=127 op=LOAD May 13 00:15:28.738000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2443 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137333632643436623466376463303132636538313532653832313731 May 13 00:15:28.739000 audit: BPF prog-id=127 op=UNLOAD May 13 00:15:28.739000 audit: BPF prog-id=126 op=UNLOAD May 13 00:15:28.739000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.739000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.739000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.739000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.739000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.739000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.739000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.739000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.739000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.739000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:28.739000 audit: BPF prog-id=128 op=LOAD May 13 00:15:28.739000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2443 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137333632643436623466376463303132636538313532653832313731 May 13 00:15:28.751951 env[1212]: time="2025-05-13T00:15:28.751903000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j7m72,Uid:f9114711-2164-4786-98f5-e66cdb07deb9,Namespace:calico-system,Attempt:0,} returns sandbox id \"17362d46b4f7dc012ce8152e82171904533e433d0134b9ab9f40a0d55a31990d\"" May 13 00:15:28.752549 kubelet[1951]: E0513 00:15:28.752524 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:28.778000 audit[2477]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:28.778000 audit[2477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffca974920 a2=0 a3=1 items=0 ppid=2094 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.778000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:28.788000 audit[2477]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:28.788000 audit[2477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffca974920 a2=0 a3=1 items=0 ppid=2094 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:28.788000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:28.880090 kubelet[1951]: E0513 00:15:28.880011 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:28.891610 kubelet[1951]: E0513 00:15:28.891479 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.891610 kubelet[1951]: W0513 00:15:28.891528 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.891610 kubelet[1951]: E0513 00:15:28.891549 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.891887 kubelet[1951]: E0513 00:15:28.891727 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.891887 kubelet[1951]: W0513 00:15:28.891736 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.891887 kubelet[1951]: E0513 00:15:28.891746 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.891963 kubelet[1951]: E0513 00:15:28.891901 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.891963 kubelet[1951]: W0513 00:15:28.891910 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.891963 kubelet[1951]: E0513 00:15:28.891932 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.892097 kubelet[1951]: E0513 00:15:28.892073 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.892097 kubelet[1951]: W0513 00:15:28.892096 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.892157 kubelet[1951]: E0513 00:15:28.892106 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.892350 kubelet[1951]: E0513 00:15:28.892272 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.892350 kubelet[1951]: W0513 00:15:28.892283 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.892350 kubelet[1951]: E0513 00:15:28.892292 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.892511 kubelet[1951]: E0513 00:15:28.892437 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.892511 kubelet[1951]: W0513 00:15:28.892445 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.892511 kubelet[1951]: E0513 00:15:28.892478 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.892751 kubelet[1951]: E0513 00:15:28.892658 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.892751 kubelet[1951]: W0513 00:15:28.892669 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.892751 kubelet[1951]: E0513 00:15:28.892678 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.892917 kubelet[1951]: E0513 00:15:28.892827 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.892917 kubelet[1951]: W0513 00:15:28.892835 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.892917 kubelet[1951]: E0513 00:15:28.892845 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.893151 kubelet[1951]: E0513 00:15:28.892998 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.893151 kubelet[1951]: W0513 00:15:28.893018 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.893151 kubelet[1951]: E0513 00:15:28.893031 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.893252 kubelet[1951]: E0513 00:15:28.893182 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.893252 kubelet[1951]: W0513 00:15:28.893190 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.893252 kubelet[1951]: E0513 00:15:28.893198 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.893449 kubelet[1951]: E0513 00:15:28.893380 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.893449 kubelet[1951]: W0513 00:15:28.893403 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.893449 kubelet[1951]: E0513 00:15:28.893414 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.893656 kubelet[1951]: E0513 00:15:28.893594 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.893656 kubelet[1951]: W0513 00:15:28.893603 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.893656 kubelet[1951]: E0513 00:15:28.893612 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.893817 kubelet[1951]: E0513 00:15:28.893771 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.893817 kubelet[1951]: W0513 00:15:28.893779 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.893817 kubelet[1951]: E0513 00:15:28.893787 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.894041 kubelet[1951]: E0513 00:15:28.893995 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.894041 kubelet[1951]: W0513 00:15:28.894008 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.894041 kubelet[1951]: E0513 00:15:28.894017 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:28.894235 kubelet[1951]: E0513 00:15:28.894176 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:28.894235 kubelet[1951]: W0513 00:15:28.894188 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:28.894235 kubelet[1951]: E0513 00:15:28.894208 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.550905 kubelet[1951]: E0513 00:15:29.550869 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:29.599652 kubelet[1951]: E0513 00:15:29.599623 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.599652 kubelet[1951]: W0513 00:15:29.599648 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.599855 kubelet[1951]: E0513 00:15:29.599668 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.599887 kubelet[1951]: E0513 00:15:29.599858 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.599887 kubelet[1951]: W0513 00:15:29.599865 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.599887 kubelet[1951]: E0513 00:15:29.599873 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.600045 kubelet[1951]: E0513 00:15:29.600020 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.600045 kubelet[1951]: W0513 00:15:29.600043 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.600119 kubelet[1951]: E0513 00:15:29.600051 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.600263 kubelet[1951]: E0513 00:15:29.600253 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.600263 kubelet[1951]: W0513 00:15:29.600263 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.600333 kubelet[1951]: E0513 00:15:29.600271 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.600417 kubelet[1951]: E0513 00:15:29.600407 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.600417 kubelet[1951]: W0513 00:15:29.600416 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.600488 kubelet[1951]: E0513 00:15:29.600424 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.600554 kubelet[1951]: E0513 00:15:29.600545 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.600554 kubelet[1951]: W0513 00:15:29.600554 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.600625 kubelet[1951]: E0513 00:15:29.600561 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.600680 kubelet[1951]: E0513 00:15:29.600671 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.600680 kubelet[1951]: W0513 00:15:29.600680 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.600763 kubelet[1951]: E0513 00:15:29.600687 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.600841 kubelet[1951]: E0513 00:15:29.600830 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.600841 kubelet[1951]: W0513 00:15:29.600841 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.600906 kubelet[1951]: E0513 00:15:29.600848 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.601013 kubelet[1951]: E0513 00:15:29.601000 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.601013 kubelet[1951]: W0513 00:15:29.601010 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.601081 kubelet[1951]: E0513 00:15:29.601019 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.601150 kubelet[1951]: E0513 00:15:29.601139 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.601150 kubelet[1951]: W0513 00:15:29.601149 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.601233 kubelet[1951]: E0513 00:15:29.601156 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.601363 kubelet[1951]: E0513 00:15:29.601348 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.601363 kubelet[1951]: W0513 00:15:29.601360 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.601424 kubelet[1951]: E0513 00:15:29.601406 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.601648 kubelet[1951]: E0513 00:15:29.601634 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.601648 kubelet[1951]: W0513 00:15:29.601647 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.601744 kubelet[1951]: E0513 00:15:29.601656 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.601868 kubelet[1951]: E0513 00:15:29.601829 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.601908 kubelet[1951]: W0513 00:15:29.601873 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.601908 kubelet[1951]: E0513 00:15:29.601884 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.602136 kubelet[1951]: E0513 00:15:29.602093 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.602177 kubelet[1951]: W0513 00:15:29.602136 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.602177 kubelet[1951]: E0513 00:15:29.602147 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.602545 kubelet[1951]: E0513 00:15:29.602527 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.602584 kubelet[1951]: W0513 00:15:29.602545 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.602584 kubelet[1951]: E0513 00:15:29.602556 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.602761 kubelet[1951]: E0513 00:15:29.602748 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.602761 kubelet[1951]: W0513 00:15:29.602762 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.602839 kubelet[1951]: E0513 00:15:29.602771 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.603035 kubelet[1951]: E0513 00:15:29.603023 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.603076 kubelet[1951]: W0513 00:15:29.603036 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.603076 kubelet[1951]: E0513 00:15:29.603046 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.603207 kubelet[1951]: E0513 00:15:29.603196 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.603207 kubelet[1951]: W0513 00:15:29.603206 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.603292 kubelet[1951]: E0513 00:15:29.603223 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.603381 kubelet[1951]: E0513 00:15:29.603371 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.603381 kubelet[1951]: W0513 00:15:29.603380 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.603451 kubelet[1951]: E0513 00:15:29.603388 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.603527 kubelet[1951]: E0513 00:15:29.603517 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.603527 kubelet[1951]: W0513 00:15:29.603526 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.603592 kubelet[1951]: E0513 00:15:29.603533 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.603679 kubelet[1951]: E0513 00:15:29.603669 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.603679 kubelet[1951]: W0513 00:15:29.603679 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.603755 kubelet[1951]: E0513 00:15:29.603686 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.604074 kubelet[1951]: E0513 00:15:29.604056 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.604074 kubelet[1951]: W0513 00:15:29.604075 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.604148 kubelet[1951]: E0513 00:15:29.604086 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.604565 kubelet[1951]: E0513 00:15:29.604548 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.604623 kubelet[1951]: W0513 00:15:29.604564 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.604623 kubelet[1951]: E0513 00:15:29.604608 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.604861 kubelet[1951]: E0513 00:15:29.604849 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.604903 kubelet[1951]: W0513 00:15:29.604861 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.604934 kubelet[1951]: E0513 00:15:29.604872 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.605126 kubelet[1951]: E0513 00:15:29.605114 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:29.605167 kubelet[1951]: W0513 00:15:29.605129 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:29.605167 kubelet[1951]: E0513 00:15:29.605139 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:29.830044 kubelet[1951]: E0513 00:15:29.829936 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wg7hs" podUID="44e13a95-a792-40e7-82f9-58a1c59c3031" May 13 00:15:29.994314 update_engine[1204]: I0513 00:15:29.994261 1204 update_attempter.cc:509] Updating boot flags... May 13 00:15:30.431451 kubelet[1951]: E0513 00:15:30.431409 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:30.435270 env[1212]: time="2025-05-13T00:15:30.435204988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:30.437967 env[1212]: time="2025-05-13T00:15:30.437908552Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:30.439601 env[1212]: time="2025-05-13T00:15:30.439566749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:30.442287 env[1212]: time="2025-05-13T00:15:30.442243664Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:30.443336 env[1212]: time="2025-05-13T00:15:30.443292111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 13 00:15:30.445287 env[1212]: time="2025-05-13T00:15:30.445245280Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:15:30.458048 env[1212]: time="2025-05-13T00:15:30.457978973Z" level=info msg="CreateContainer within sandbox \"1990910b7a187be0908bc81ce1c982ea0660e3ca47f239f259db048af77fd83e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 00:15:30.477769 env[1212]: time="2025-05-13T00:15:30.477711889Z" level=info msg="CreateContainer within sandbox \"1990910b7a187be0908bc81ce1c982ea0660e3ca47f239f259db048af77fd83e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"657a7b93bb3e21c8185c6ee21d0280dfcc20bf52196b217bacc16010628a7bd0\"" May 13 00:15:30.478415 env[1212]: time="2025-05-13T00:15:30.478378457Z" level=info msg="StartContainer for \"657a7b93bb3e21c8185c6ee21d0280dfcc20bf52196b217bacc16010628a7bd0\"" May 13 00:15:30.502892 systemd[1]: Started cri-containerd-657a7b93bb3e21c8185c6ee21d0280dfcc20bf52196b217bacc16010628a7bd0.scope. May 13 00:15:30.513079 kubelet[1951]: E0513 00:15:30.512988 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.513079 kubelet[1951]: W0513 00:15:30.513014 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.513079 kubelet[1951]: E0513 00:15:30.513033 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.517757 kubelet[1951]: E0513 00:15:30.517719 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.517757 kubelet[1951]: W0513 00:15:30.517740 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.517757 kubelet[1951]: E0513 00:15:30.517756 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.518115 kubelet[1951]: E0513 00:15:30.518086 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.518115 kubelet[1951]: W0513 00:15:30.518102 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.518115 kubelet[1951]: E0513 00:15:30.518112 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.518391 kubelet[1951]: E0513 00:15:30.518306 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.518391 kubelet[1951]: W0513 00:15:30.518318 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.518391 kubelet[1951]: E0513 00:15:30.518327 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.519692 kubelet[1951]: E0513 00:15:30.518643 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.519692 kubelet[1951]: W0513 00:15:30.518656 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.519692 kubelet[1951]: E0513 00:15:30.518665 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.555807 kernel: kauditd_printk_skb: 179 callbacks suppressed May 13 00:15:30.555889 kernel: audit: type=1400 audit(1747095330.552:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.555913 kernel: audit: type=1400 audit(1747095330.552:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.557745 kernel: audit: type=1400 audit(1747095330.552:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.561672 kernel: audit: type=1400 audit(1747095330.552:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.561740 kernel: audit: type=1400 audit(1747095330.552:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.565839 kernel: audit: type=1400 audit(1747095330.552:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.565902 kernel: audit: type=1400 audit(1747095330.552:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.575630 kernel: audit: type=1400 audit(1747095330.552:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.575724 kernel: audit: type=1400 audit(1747095330.552:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.579197 kernel: audit: type=1400 audit(1747095330.552:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit: BPF prog-id=129 op=LOAD May 13 00:15:30.552000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[2541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2403 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:30.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635376137623933626233653231633831383563366565323164303238 May 13 00:15:30.552000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[2541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2403 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:30.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635376137623933626233653231633831383563366565323164303238 May 13 00:15:30.552000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.552000 audit: BPF prog-id=130 op=LOAD May 13 00:15:30.552000 audit[2541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2403 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:30.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635376137623933626233653231633831383563366565323164303238 May 13 00:15:30.554000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.554000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.554000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.554000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.554000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.554000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.554000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.554000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.554000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.554000 audit: BPF prog-id=131 op=LOAD May 13 00:15:30.554000 audit[2541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2403 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:30.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635376137623933626233653231633831383563366565323164303238 May 13 00:15:30.556000 audit: BPF prog-id=131 op=UNLOAD May 13 00:15:30.556000 audit: BPF prog-id=130 op=UNLOAD May 13 00:15:30.556000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.556000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.556000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.556000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.556000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.556000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.556000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.556000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.556000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.556000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:30.556000 audit: BPF prog-id=132 op=LOAD May 13 00:15:30.556000 audit[2541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2403 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:30.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635376137623933626233653231633831383563366565323164303238 May 13 00:15:30.619597 env[1212]: time="2025-05-13T00:15:30.619537776Z" level=info msg="StartContainer for \"657a7b93bb3e21c8185c6ee21d0280dfcc20bf52196b217bacc16010628a7bd0\" returns successfully" May 13 00:15:30.885129 kubelet[1951]: E0513 00:15:30.885006 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:30.897060 kubelet[1951]: I0513 00:15:30.897000 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-57589fb575-2wjzk" podStartSLOduration=1.151502896 podStartE2EDuration="2.896983492s" podCreationTimestamp="2025-05-13 00:15:28 +0000 UTC" firstStartedPulling="2025-05-13 00:15:28.698814908 +0000 UTC m=+12.968058706" lastFinishedPulling="2025-05-13 00:15:30.444295504 +0000 UTC m=+14.713539302" observedRunningTime="2025-05-13 00:15:30.896245942 +0000 UTC m=+15.165489740" watchObservedRunningTime="2025-05-13 00:15:30.896983492 +0000 UTC m=+15.166227290" May 13 00:15:30.922281 kubelet[1951]: E0513 00:15:30.922254 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.922431 kubelet[1951]: W0513 00:15:30.922415 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.922643 kubelet[1951]: E0513 00:15:30.922624 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.922922 kubelet[1951]: E0513 00:15:30.922908 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.923019 kubelet[1951]: W0513 00:15:30.923006 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.923094 kubelet[1951]: E0513 00:15:30.923083 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.923339 kubelet[1951]: E0513 00:15:30.923328 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.923434 kubelet[1951]: W0513 00:15:30.923422 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.923527 kubelet[1951]: E0513 00:15:30.923484 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.923767 kubelet[1951]: E0513 00:15:30.923755 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.923855 kubelet[1951]: W0513 00:15:30.923843 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.923926 kubelet[1951]: E0513 00:15:30.923905 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.924238 kubelet[1951]: E0513 00:15:30.924207 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.924335 kubelet[1951]: W0513 00:15:30.924323 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.924405 kubelet[1951]: E0513 00:15:30.924382 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.924638 kubelet[1951]: E0513 00:15:30.924618 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.924730 kubelet[1951]: W0513 00:15:30.924717 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.924795 kubelet[1951]: E0513 00:15:30.924775 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.925032 kubelet[1951]: E0513 00:15:30.925012 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.925105 kubelet[1951]: W0513 00:15:30.925093 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.925180 kubelet[1951]: E0513 00:15:30.925168 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.925422 kubelet[1951]: E0513 00:15:30.925410 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.925510 kubelet[1951]: W0513 00:15:30.925497 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.925569 kubelet[1951]: E0513 00:15:30.925558 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.925790 kubelet[1951]: E0513 00:15:30.925779 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.925866 kubelet[1951]: W0513 00:15:30.925854 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.925928 kubelet[1951]: E0513 00:15:30.925917 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.926147 kubelet[1951]: E0513 00:15:30.926135 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.926273 kubelet[1951]: W0513 00:15:30.926259 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.926369 kubelet[1951]: E0513 00:15:30.926357 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.926582 kubelet[1951]: E0513 00:15:30.926570 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.926652 kubelet[1951]: W0513 00:15:30.926640 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.926718 kubelet[1951]: E0513 00:15:30.926706 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.926917 kubelet[1951]: E0513 00:15:30.926905 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.926986 kubelet[1951]: W0513 00:15:30.926974 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.927048 kubelet[1951]: E0513 00:15:30.927037 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.927303 kubelet[1951]: E0513 00:15:30.927290 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.927388 kubelet[1951]: W0513 00:15:30.927375 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.927451 kubelet[1951]: E0513 00:15:30.927439 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.927667 kubelet[1951]: E0513 00:15:30.927654 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.927761 kubelet[1951]: W0513 00:15:30.927747 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.927825 kubelet[1951]: E0513 00:15:30.927813 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:30.928021 kubelet[1951]: E0513 00:15:30.928009 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:30.928098 kubelet[1951]: W0513 00:15:30.928085 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:30.928172 kubelet[1951]: E0513 00:15:30.928160 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.022975 kubelet[1951]: E0513 00:15:31.022945 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.023148 kubelet[1951]: W0513 00:15:31.023122 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.023235 kubelet[1951]: E0513 00:15:31.023209 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.023536 kubelet[1951]: E0513 00:15:31.023521 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.023631 kubelet[1951]: W0513 00:15:31.023617 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.023717 kubelet[1951]: E0513 00:15:31.023699 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.023971 kubelet[1951]: E0513 00:15:31.023933 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.023971 kubelet[1951]: W0513 00:15:31.023952 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.023971 kubelet[1951]: E0513 00:15:31.023969 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.024131 kubelet[1951]: E0513 00:15:31.024121 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.024131 kubelet[1951]: W0513 00:15:31.024131 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.024294 kubelet[1951]: E0513 00:15:31.024154 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.024328 kubelet[1951]: E0513 00:15:31.024316 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.024328 kubelet[1951]: W0513 00:15:31.024324 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.024379 kubelet[1951]: E0513 00:15:31.024332 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.024505 kubelet[1951]: E0513 00:15:31.024493 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.024505 kubelet[1951]: W0513 00:15:31.024503 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.024571 kubelet[1951]: E0513 00:15:31.024512 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.024791 kubelet[1951]: E0513 00:15:31.024774 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.024874 kubelet[1951]: W0513 00:15:31.024860 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.024973 kubelet[1951]: E0513 00:15:31.024959 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.025234 kubelet[1951]: E0513 00:15:31.025220 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.025234 kubelet[1951]: W0513 00:15:31.025233 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.025330 kubelet[1951]: E0513 00:15:31.025251 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.025432 kubelet[1951]: E0513 00:15:31.025422 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.025432 kubelet[1951]: W0513 00:15:31.025431 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.025495 kubelet[1951]: E0513 00:15:31.025443 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.025605 kubelet[1951]: E0513 00:15:31.025595 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.025605 kubelet[1951]: W0513 00:15:31.025605 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.025673 kubelet[1951]: E0513 00:15:31.025616 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.025783 kubelet[1951]: E0513 00:15:31.025773 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.025783 kubelet[1951]: W0513 00:15:31.025783 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.025847 kubelet[1951]: E0513 00:15:31.025794 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.026073 kubelet[1951]: E0513 00:15:31.026062 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.026073 kubelet[1951]: W0513 00:15:31.026072 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.026198 kubelet[1951]: E0513 00:15:31.026181 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.026295 kubelet[1951]: E0513 00:15:31.026237 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.026368 kubelet[1951]: W0513 00:15:31.026354 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.026445 kubelet[1951]: E0513 00:15:31.026428 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.026647 kubelet[1951]: E0513 00:15:31.026635 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.026720 kubelet[1951]: W0513 00:15:31.026708 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.026785 kubelet[1951]: E0513 00:15:31.026773 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.027020 kubelet[1951]: E0513 00:15:31.027010 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.027089 kubelet[1951]: W0513 00:15:31.027077 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.027153 kubelet[1951]: E0513 00:15:31.027132 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.027403 kubelet[1951]: E0513 00:15:31.027391 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.027485 kubelet[1951]: W0513 00:15:31.027473 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.027550 kubelet[1951]: E0513 00:15:31.027538 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.027784 kubelet[1951]: E0513 00:15:31.027772 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.027862 kubelet[1951]: W0513 00:15:31.027850 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.027930 kubelet[1951]: E0513 00:15:31.027918 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.028324 kubelet[1951]: E0513 00:15:31.028310 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:15:31.028417 kubelet[1951]: W0513 00:15:31.028405 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:15:31.028485 kubelet[1951]: E0513 00:15:31.028473 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:15:31.587723 env[1212]: time="2025-05-13T00:15:31.587669266Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:31.589771 env[1212]: time="2025-05-13T00:15:31.589732239Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:31.591540 env[1212]: time="2025-05-13T00:15:31.591504525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:31.593136 env[1212]: time="2025-05-13T00:15:31.593100999Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:31.593542 env[1212]: time="2025-05-13T00:15:31.593503718Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 13 00:15:31.595996 env[1212]: time="2025-05-13T00:15:31.595948324Z" level=info msg="CreateContainer within sandbox \"17362d46b4f7dc012ce8152e82171904533e433d0134b9ab9f40a0d55a31990d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:15:31.608077 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount60157074.mount: Deactivated successfully. May 13 00:15:31.612976 env[1212]: time="2025-05-13T00:15:31.612916721Z" level=info msg="CreateContainer within sandbox \"17362d46b4f7dc012ce8152e82171904533e433d0134b9ab9f40a0d55a31990d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"acd4a465ea9ecc9e676ccc53022b505387504c3d985f6fecc3ea78488d224f19\"" May 13 00:15:31.613552 env[1212]: time="2025-05-13T00:15:31.613528463Z" level=info msg="StartContainer for \"acd4a465ea9ecc9e676ccc53022b505387504c3d985f6fecc3ea78488d224f19\"" May 13 00:15:31.631880 systemd[1]: Started cri-containerd-acd4a465ea9ecc9e676ccc53022b505387504c3d985f6fecc3ea78488d224f19.scope. May 13 00:15:31.674000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.674000 audit[2619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2443 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:31.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643461343635656139656363396536373663636335333032326235 May 13 00:15:31.674000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.674000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.674000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.674000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.674000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.674000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.674000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.674000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.674000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.674000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.674000 audit: BPF prog-id=133 op=LOAD May 13 00:15:31.674000 audit[2619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2443 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:31.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643461343635656139656363396536373663636335333032326235 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit: BPF prog-id=134 op=LOAD May 13 00:15:31.675000 audit[2619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2443 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:31.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643461343635656139656363396536373663636335333032326235 May 13 00:15:31.675000 audit: BPF prog-id=134 op=UNLOAD May 13 00:15:31.675000 audit: BPF prog-id=133 op=UNLOAD May 13 00:15:31.675000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:31.675000 audit: BPF prog-id=135 op=LOAD May 13 00:15:31.675000 audit[2619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2443 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:31.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643461343635656139656363396536373663636335333032326235 May 13 00:15:31.691785 env[1212]: time="2025-05-13T00:15:31.691686025Z" level=info msg="StartContainer for \"acd4a465ea9ecc9e676ccc53022b505387504c3d985f6fecc3ea78488d224f19\" returns successfully" May 13 00:15:31.716841 systemd[1]: cri-containerd-acd4a465ea9ecc9e676ccc53022b505387504c3d985f6fecc3ea78488d224f19.scope: Deactivated successfully. May 13 00:15:31.720000 audit: BPF prog-id=135 op=UNLOAD May 13 00:15:31.828689 kubelet[1951]: E0513 00:15:31.828345 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wg7hs" podUID="44e13a95-a792-40e7-82f9-58a1c59c3031" May 13 00:15:31.846578 env[1212]: time="2025-05-13T00:15:31.846461491Z" level=info msg="shim disconnected" id=acd4a465ea9ecc9e676ccc53022b505387504c3d985f6fecc3ea78488d224f19 May 13 00:15:31.846757 env[1212]: time="2025-05-13T00:15:31.846736333Z" level=warning msg="cleaning up after shim disconnected" id=acd4a465ea9ecc9e676ccc53022b505387504c3d985f6fecc3ea78488d224f19 namespace=k8s.io May 13 00:15:31.846850 env[1212]: time="2025-05-13T00:15:31.846836162Z" level=info msg="cleaning up dead shim" May 13 00:15:31.854504 env[1212]: time="2025-05-13T00:15:31.854463186Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:15:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2657 runtime=io.containerd.runc.v2\n" May 13 00:15:31.888186 kubelet[1951]: I0513 00:15:31.888156 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:15:31.888542 kubelet[1951]: E0513 00:15:31.888485 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:31.889098 kubelet[1951]: E0513 00:15:31.889053 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:31.891362 env[1212]: time="2025-05-13T00:15:31.890821180Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:15:32.605721 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-acd4a465ea9ecc9e676ccc53022b505387504c3d985f6fecc3ea78488d224f19-rootfs.mount: Deactivated successfully. May 13 00:15:33.828428 kubelet[1951]: E0513 00:15:33.828350 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wg7hs" podUID="44e13a95-a792-40e7-82f9-58a1c59c3031" May 13 00:15:35.406294 env[1212]: time="2025-05-13T00:15:35.406106372Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:35.407753 env[1212]: time="2025-05-13T00:15:35.407707965Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:35.409463 env[1212]: time="2025-05-13T00:15:35.409419744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:35.411191 env[1212]: time="2025-05-13T00:15:35.410989049Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:35.411605 env[1212]: time="2025-05-13T00:15:35.411548747Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 13 00:15:35.426002 env[1212]: time="2025-05-13T00:15:35.425953319Z" level=info msg="CreateContainer within sandbox \"17362d46b4f7dc012ce8152e82171904533e433d0134b9ab9f40a0d55a31990d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:15:35.440780 env[1212]: time="2025-05-13T00:15:35.440703697Z" level=info msg="CreateContainer within sandbox \"17362d46b4f7dc012ce8152e82171904533e433d0134b9ab9f40a0d55a31990d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"fbe0c754cfce2fe1a0e93f2d8bb6028c8eddd6af9ab1709a59d6f68465954529\"" May 13 00:15:35.441625 env[1212]: time="2025-05-13T00:15:35.441596116Z" level=info msg="StartContainer for \"fbe0c754cfce2fe1a0e93f2d8bb6028c8eddd6af9ab1709a59d6f68465954529\"" May 13 00:15:35.463431 systemd[1]: Started cri-containerd-fbe0c754cfce2fe1a0e93f2d8bb6028c8eddd6af9ab1709a59d6f68465954529.scope. May 13 00:15:35.528000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.528000 audit[2683]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2443 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:35.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653063373534636663653266653161306539336632643862623630 May 13 00:15:35.528000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.528000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.528000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.528000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.528000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.528000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.528000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.528000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.528000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.528000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.528000 audit: BPF prog-id=136 op=LOAD May 13 00:15:35.528000 audit[2683]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2443 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:35.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653063373534636663653266653161306539336632643862623630 May 13 00:15:35.529000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.529000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.529000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.529000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.529000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.529000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.529000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.529000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.529000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.529000 audit: BPF prog-id=137 op=LOAD May 13 00:15:35.529000 audit[2683]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2443 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:35.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653063373534636663653266653161306539336632643862623630 May 13 00:15:35.530000 audit: BPF prog-id=137 op=UNLOAD May 13 00:15:35.530000 audit: BPF prog-id=136 op=UNLOAD May 13 00:15:35.530000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.530000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.530000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.530000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.530000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.530000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.530000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.530000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.530000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.530000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:35.530000 audit: BPF prog-id=138 op=LOAD May 13 00:15:35.530000 audit[2683]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2443 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:35.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653063373534636663653266653161306539336632643862623630 May 13 00:15:35.556526 env[1212]: time="2025-05-13T00:15:35.556452285Z" level=info msg="StartContainer for \"fbe0c754cfce2fe1a0e93f2d8bb6028c8eddd6af9ab1709a59d6f68465954529\" returns successfully" May 13 00:15:35.835615 kubelet[1951]: E0513 00:15:35.835499 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wg7hs" podUID="44e13a95-a792-40e7-82f9-58a1c59c3031" May 13 00:15:35.904674 kubelet[1951]: E0513 00:15:35.904587 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:36.150194 env[1212]: time="2025-05-13T00:15:36.150142412Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:15:36.152745 systemd[1]: cri-containerd-fbe0c754cfce2fe1a0e93f2d8bb6028c8eddd6af9ab1709a59d6f68465954529.scope: Deactivated successfully. May 13 00:15:36.158000 audit: BPF prog-id=138 op=UNLOAD May 13 00:15:36.160633 kernel: kauditd_printk_skb: 134 callbacks suppressed May 13 00:15:36.160701 kernel: audit: type=1334 audit(1747095336.158:1009): prog-id=138 op=UNLOAD May 13 00:15:36.170114 kubelet[1951]: I0513 00:15:36.170081 1951 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 13 00:15:36.176144 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fbe0c754cfce2fe1a0e93f2d8bb6028c8eddd6af9ab1709a59d6f68465954529-rootfs.mount: Deactivated successfully. May 13 00:15:36.239662 env[1212]: time="2025-05-13T00:15:36.239612495Z" level=info msg="shim disconnected" id=fbe0c754cfce2fe1a0e93f2d8bb6028c8eddd6af9ab1709a59d6f68465954529 May 13 00:15:36.240668 env[1212]: time="2025-05-13T00:15:36.240632174Z" level=warning msg="cleaning up after shim disconnected" id=fbe0c754cfce2fe1a0e93f2d8bb6028c8eddd6af9ab1709a59d6f68465954529 namespace=k8s.io May 13 00:15:36.240668 env[1212]: time="2025-05-13T00:15:36.240666622Z" level=info msg="cleaning up dead shim" May 13 00:15:36.256342 env[1212]: time="2025-05-13T00:15:36.256260235Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:15:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2727 runtime=io.containerd.runc.v2\n" May 13 00:15:36.257404 systemd[1]: Created slice kubepods-burstable-podb7eaf24b_58d9_45e5_b364_5ba55a087a71.slice. May 13 00:15:36.263330 systemd[1]: Created slice kubepods-besteffort-podd0fc6189_5541_4d79_b8a2_4b772da81d19.slice. May 13 00:15:36.272110 systemd[1]: Created slice kubepods-besteffort-podf3b54bbc_97b4_4186_b0e1_1275f78689f8.slice. May 13 00:15:36.280697 systemd[1]: Created slice kubepods-burstable-pod6ea7591f_a126_4b28_aaed_48b0d2ffd7ad.slice. May 13 00:15:36.289427 systemd[1]: Created slice kubepods-besteffort-pod51abde12_be7a_4fec_9e5c_125c65b05aea.slice. May 13 00:15:36.367470 kubelet[1951]: I0513 00:15:36.367416 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9jfr9\" (UniqueName: \"kubernetes.io/projected/6ea7591f-a126-4b28-aaed-48b0d2ffd7ad-kube-api-access-9jfr9\") pod \"coredns-6f6b679f8f-dn47n\" (UID: \"6ea7591f-a126-4b28-aaed-48b0d2ffd7ad\") " pod="kube-system/coredns-6f6b679f8f-dn47n" May 13 00:15:36.367656 kubelet[1951]: I0513 00:15:36.367480 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zqzzn\" (UniqueName: \"kubernetes.io/projected/51abde12-be7a-4fec-9e5c-125c65b05aea-kube-api-access-zqzzn\") pod \"calico-apiserver-66676fbdf9-48jcd\" (UID: \"51abde12-be7a-4fec-9e5c-125c65b05aea\") " pod="calico-apiserver/calico-apiserver-66676fbdf9-48jcd" May 13 00:15:36.367656 kubelet[1951]: I0513 00:15:36.367499 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b7eaf24b-58d9-45e5-b364-5ba55a087a71-config-volume\") pod \"coredns-6f6b679f8f-kh2hc\" (UID: \"b7eaf24b-58d9-45e5-b364-5ba55a087a71\") " pod="kube-system/coredns-6f6b679f8f-kh2hc" May 13 00:15:36.367656 kubelet[1951]: I0513 00:15:36.367518 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lm4kk\" (UniqueName: \"kubernetes.io/projected/b7eaf24b-58d9-45e5-b364-5ba55a087a71-kube-api-access-lm4kk\") pod \"coredns-6f6b679f8f-kh2hc\" (UID: \"b7eaf24b-58d9-45e5-b364-5ba55a087a71\") " pod="kube-system/coredns-6f6b679f8f-kh2hc" May 13 00:15:36.367656 kubelet[1951]: I0513 00:15:36.367536 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6ea7591f-a126-4b28-aaed-48b0d2ffd7ad-config-volume\") pod \"coredns-6f6b679f8f-dn47n\" (UID: \"6ea7591f-a126-4b28-aaed-48b0d2ffd7ad\") " pod="kube-system/coredns-6f6b679f8f-dn47n" May 13 00:15:36.367656 kubelet[1951]: I0513 00:15:36.367569 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d0fc6189-5541-4d79-b8a2-4b772da81d19-tigera-ca-bundle\") pod \"calico-kube-controllers-7599cddf5c-qcxfq\" (UID: \"d0fc6189-5541-4d79-b8a2-4b772da81d19\") " pod="calico-system/calico-kube-controllers-7599cddf5c-qcxfq" May 13 00:15:36.367792 kubelet[1951]: I0513 00:15:36.367596 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f3b54bbc-97b4-4186-b0e1-1275f78689f8-calico-apiserver-certs\") pod \"calico-apiserver-66676fbdf9-qhj5k\" (UID: \"f3b54bbc-97b4-4186-b0e1-1275f78689f8\") " pod="calico-apiserver/calico-apiserver-66676fbdf9-qhj5k" May 13 00:15:36.367792 kubelet[1951]: I0513 00:15:36.367612 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bxkxv\" (UniqueName: \"kubernetes.io/projected/f3b54bbc-97b4-4186-b0e1-1275f78689f8-kube-api-access-bxkxv\") pod \"calico-apiserver-66676fbdf9-qhj5k\" (UID: \"f3b54bbc-97b4-4186-b0e1-1275f78689f8\") " pod="calico-apiserver/calico-apiserver-66676fbdf9-qhj5k" May 13 00:15:36.367792 kubelet[1951]: I0513 00:15:36.367643 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/51abde12-be7a-4fec-9e5c-125c65b05aea-calico-apiserver-certs\") pod \"calico-apiserver-66676fbdf9-48jcd\" (UID: \"51abde12-be7a-4fec-9e5c-125c65b05aea\") " pod="calico-apiserver/calico-apiserver-66676fbdf9-48jcd" May 13 00:15:36.367792 kubelet[1951]: I0513 00:15:36.367663 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m8fz4\" (UniqueName: \"kubernetes.io/projected/d0fc6189-5541-4d79-b8a2-4b772da81d19-kube-api-access-m8fz4\") pod \"calico-kube-controllers-7599cddf5c-qcxfq\" (UID: \"d0fc6189-5541-4d79-b8a2-4b772da81d19\") " pod="calico-system/calico-kube-controllers-7599cddf5c-qcxfq" May 13 00:15:36.560742 kubelet[1951]: E0513 00:15:36.560573 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:36.563275 env[1212]: time="2025-05-13T00:15:36.563236881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-kh2hc,Uid:b7eaf24b-58d9-45e5-b364-5ba55a087a71,Namespace:kube-system,Attempt:0,}" May 13 00:15:36.570619 env[1212]: time="2025-05-13T00:15:36.570554756Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7599cddf5c-qcxfq,Uid:d0fc6189-5541-4d79-b8a2-4b772da81d19,Namespace:calico-system,Attempt:0,}" May 13 00:15:36.575738 env[1212]: time="2025-05-13T00:15:36.575703762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66676fbdf9-qhj5k,Uid:f3b54bbc-97b4-4186-b0e1-1275f78689f8,Namespace:calico-apiserver,Attempt:0,}" May 13 00:15:36.585633 kubelet[1951]: E0513 00:15:36.585593 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:36.589769 env[1212]: time="2025-05-13T00:15:36.587411025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-dn47n,Uid:6ea7591f-a126-4b28-aaed-48b0d2ffd7ad,Namespace:kube-system,Attempt:0,}" May 13 00:15:36.598876 env[1212]: time="2025-05-13T00:15:36.596009320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66676fbdf9-48jcd,Uid:51abde12-be7a-4fec-9e5c-125c65b05aea,Namespace:calico-apiserver,Attempt:0,}" May 13 00:15:36.816379 env[1212]: time="2025-05-13T00:15:36.816010107Z" level=error msg="Failed to destroy network for sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.816882 env[1212]: time="2025-05-13T00:15:36.816470294Z" level=error msg="encountered an error cleaning up failed sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.816882 env[1212]: time="2025-05-13T00:15:36.816544392Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-dn47n,Uid:6ea7591f-a126-4b28-aaed-48b0d2ffd7ad,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.818087 kubelet[1951]: E0513 00:15:36.818037 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.818211 kubelet[1951]: E0513 00:15:36.818135 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-dn47n" May 13 00:15:36.818211 kubelet[1951]: E0513 00:15:36.818156 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-dn47n" May 13 00:15:36.818300 kubelet[1951]: E0513 00:15:36.818201 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-dn47n_kube-system(6ea7591f-a126-4b28-aaed-48b0d2ffd7ad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-dn47n_kube-system(6ea7591f-a126-4b28-aaed-48b0d2ffd7ad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-dn47n" podUID="6ea7591f-a126-4b28-aaed-48b0d2ffd7ad" May 13 00:15:36.834646 env[1212]: time="2025-05-13T00:15:36.834437584Z" level=error msg="Failed to destroy network for sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.835369 env[1212]: time="2025-05-13T00:15:36.835323752Z" level=error msg="encountered an error cleaning up failed sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.835548 env[1212]: time="2025-05-13T00:15:36.835517877Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7599cddf5c-qcxfq,Uid:d0fc6189-5541-4d79-b8a2-4b772da81d19,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.836424 kubelet[1951]: E0513 00:15:36.836379 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.838944 kubelet[1951]: E0513 00:15:36.836455 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7599cddf5c-qcxfq" May 13 00:15:36.838944 kubelet[1951]: E0513 00:15:36.836480 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7599cddf5c-qcxfq" May 13 00:15:36.838944 kubelet[1951]: E0513 00:15:36.836534 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7599cddf5c-qcxfq_calico-system(d0fc6189-5541-4d79-b8a2-4b772da81d19)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7599cddf5c-qcxfq_calico-system(d0fc6189-5541-4d79-b8a2-4b772da81d19)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7599cddf5c-qcxfq" podUID="d0fc6189-5541-4d79-b8a2-4b772da81d19" May 13 00:15:36.839328 env[1212]: time="2025-05-13T00:15:36.837422084Z" level=error msg="Failed to destroy network for sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.839328 env[1212]: time="2025-05-13T00:15:36.837882872Z" level=error msg="encountered an error cleaning up failed sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.839328 env[1212]: time="2025-05-13T00:15:36.837944846Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66676fbdf9-48jcd,Uid:51abde12-be7a-4fec-9e5c-125c65b05aea,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.839492 kubelet[1951]: E0513 00:15:36.838826 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.839492 kubelet[1951]: E0513 00:15:36.838885 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66676fbdf9-48jcd" May 13 00:15:36.839492 kubelet[1951]: E0513 00:15:36.838903 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66676fbdf9-48jcd" May 13 00:15:36.839654 kubelet[1951]: E0513 00:15:36.838935 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-66676fbdf9-48jcd_calico-apiserver(51abde12-be7a-4fec-9e5c-125c65b05aea)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-66676fbdf9-48jcd_calico-apiserver(51abde12-be7a-4fec-9e5c-125c65b05aea)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66676fbdf9-48jcd" podUID="51abde12-be7a-4fec-9e5c-125c65b05aea" May 13 00:15:36.845310 env[1212]: time="2025-05-13T00:15:36.845230673Z" level=error msg="Failed to destroy network for sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.845612 env[1212]: time="2025-05-13T00:15:36.845571513Z" level=error msg="encountered an error cleaning up failed sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.845656 env[1212]: time="2025-05-13T00:15:36.845623245Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66676fbdf9-qhj5k,Uid:f3b54bbc-97b4-4186-b0e1-1275f78689f8,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.845877 kubelet[1951]: E0513 00:15:36.845843 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.847145 kubelet[1951]: E0513 00:15:36.845911 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66676fbdf9-qhj5k" May 13 00:15:36.847145 kubelet[1951]: E0513 00:15:36.845930 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66676fbdf9-qhj5k" May 13 00:15:36.847145 kubelet[1951]: E0513 00:15:36.846003 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-66676fbdf9-qhj5k_calico-apiserver(f3b54bbc-97b4-4186-b0e1-1275f78689f8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-66676fbdf9-qhj5k_calico-apiserver(f3b54bbc-97b4-4186-b0e1-1275f78689f8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66676fbdf9-qhj5k" podUID="f3b54bbc-97b4-4186-b0e1-1275f78689f8" May 13 00:15:36.851114 env[1212]: time="2025-05-13T00:15:36.851066440Z" level=error msg="Failed to destroy network for sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.852324 env[1212]: time="2025-05-13T00:15:36.852187543Z" level=error msg="encountered an error cleaning up failed sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.852792 env[1212]: time="2025-05-13T00:15:36.852755876Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-kh2hc,Uid:b7eaf24b-58d9-45e5-b364-5ba55a087a71,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.853170 kubelet[1951]: E0513 00:15:36.853126 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.853274 kubelet[1951]: E0513 00:15:36.853191 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-kh2hc" May 13 00:15:36.853274 kubelet[1951]: E0513 00:15:36.853210 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-kh2hc" May 13 00:15:36.853338 kubelet[1951]: E0513 00:15:36.853269 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-kh2hc_kube-system(b7eaf24b-58d9-45e5-b364-5ba55a087a71)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-kh2hc_kube-system(b7eaf24b-58d9-45e5-b364-5ba55a087a71)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-kh2hc" podUID="b7eaf24b-58d9-45e5-b364-5ba55a087a71" May 13 00:15:36.904205 kubelet[1951]: I0513 00:15:36.903561 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:15:36.904401 env[1212]: time="2025-05-13T00:15:36.904263425Z" level=info msg="StopPodSandbox for \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\"" May 13 00:15:36.904953 kubelet[1951]: I0513 00:15:36.904624 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:15:36.905195 env[1212]: time="2025-05-13T00:15:36.905166236Z" level=info msg="StopPodSandbox for \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\"" May 13 00:15:36.906094 kubelet[1951]: I0513 00:15:36.906058 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:15:36.909270 env[1212]: time="2025-05-13T00:15:36.906502589Z" level=info msg="StopPodSandbox for \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\"" May 13 00:15:36.918507 kubelet[1951]: E0513 00:15:36.918273 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:36.919197 env[1212]: time="2025-05-13T00:15:36.919071654Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:15:36.920211 kubelet[1951]: I0513 00:15:36.919815 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:15:36.920521 env[1212]: time="2025-05-13T00:15:36.920472142Z" level=info msg="StopPodSandbox for \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\"" May 13 00:15:36.926708 kubelet[1951]: I0513 00:15:36.926252 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:15:36.926851 env[1212]: time="2025-05-13T00:15:36.926812188Z" level=info msg="StopPodSandbox for \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\"" May 13 00:15:36.963780 env[1212]: time="2025-05-13T00:15:36.963723156Z" level=error msg="StopPodSandbox for \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\" failed" error="failed to destroy network for sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.964017 kubelet[1951]: E0513 00:15:36.963985 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:15:36.964098 kubelet[1951]: E0513 00:15:36.964049 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a"} May 13 00:15:36.964134 kubelet[1951]: E0513 00:15:36.964120 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d0fc6189-5541-4d79-b8a2-4b772da81d19\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:15:36.964189 kubelet[1951]: E0513 00:15:36.964145 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d0fc6189-5541-4d79-b8a2-4b772da81d19\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7599cddf5c-qcxfq" podUID="d0fc6189-5541-4d79-b8a2-4b772da81d19" May 13 00:15:36.987670 env[1212]: time="2025-05-13T00:15:36.987602631Z" level=error msg="StopPodSandbox for \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\" failed" error="failed to destroy network for sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.988108 kubelet[1951]: E0513 00:15:36.988060 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:15:36.988193 kubelet[1951]: E0513 00:15:36.988129 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927"} May 13 00:15:36.988193 kubelet[1951]: E0513 00:15:36.988172 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6ea7591f-a126-4b28-aaed-48b0d2ffd7ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:15:36.988439 kubelet[1951]: E0513 00:15:36.988194 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6ea7591f-a126-4b28-aaed-48b0d2ffd7ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-dn47n" podUID="6ea7591f-a126-4b28-aaed-48b0d2ffd7ad" May 13 00:15:36.989232 env[1212]: time="2025-05-13T00:15:36.989178441Z" level=error msg="StopPodSandbox for \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\" failed" error="failed to destroy network for sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:36.990666 kubelet[1951]: E0513 00:15:36.990628 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:15:36.990743 kubelet[1951]: E0513 00:15:36.990671 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86"} May 13 00:15:36.990743 kubelet[1951]: E0513 00:15:36.990725 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b7eaf24b-58d9-45e5-b364-5ba55a087a71\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:15:36.990743 kubelet[1951]: E0513 00:15:36.990746 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b7eaf24b-58d9-45e5-b364-5ba55a087a71\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-kh2hc" podUID="b7eaf24b-58d9-45e5-b364-5ba55a087a71" May 13 00:15:37.000060 env[1212]: time="2025-05-13T00:15:37.000006858Z" level=error msg="StopPodSandbox for \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\" failed" error="failed to destroy network for sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:37.000327 kubelet[1951]: E0513 00:15:37.000258 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:15:37.000327 kubelet[1951]: E0513 00:15:37.000312 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7"} May 13 00:15:37.000456 kubelet[1951]: E0513 00:15:37.000364 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"51abde12-be7a-4fec-9e5c-125c65b05aea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:15:37.000456 kubelet[1951]: E0513 00:15:37.000391 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"51abde12-be7a-4fec-9e5c-125c65b05aea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66676fbdf9-48jcd" podUID="51abde12-be7a-4fec-9e5c-125c65b05aea" May 13 00:15:37.001314 env[1212]: time="2025-05-13T00:15:37.001267913Z" level=error msg="StopPodSandbox for \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\" failed" error="failed to destroy network for sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:37.001626 kubelet[1951]: E0513 00:15:37.001578 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:15:37.001626 kubelet[1951]: E0513 00:15:37.001614 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb"} May 13 00:15:37.001718 kubelet[1951]: E0513 00:15:37.001643 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f3b54bbc-97b4-4186-b0e1-1275f78689f8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:15:37.001718 kubelet[1951]: E0513 00:15:37.001662 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f3b54bbc-97b4-4186-b0e1-1275f78689f8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66676fbdf9-qhj5k" podUID="f3b54bbc-97b4-4186-b0e1-1275f78689f8" May 13 00:15:37.833331 systemd[1]: Created slice kubepods-besteffort-pod44e13a95_a792_40e7_82f9_58a1c59c3031.slice. May 13 00:15:37.835022 env[1212]: time="2025-05-13T00:15:37.834960450Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wg7hs,Uid:44e13a95-a792-40e7-82f9-58a1c59c3031,Namespace:calico-system,Attempt:0,}" May 13 00:15:37.883899 env[1212]: time="2025-05-13T00:15:37.883834240Z" level=error msg="Failed to destroy network for sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:37.885874 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3-shm.mount: Deactivated successfully. May 13 00:15:37.886634 env[1212]: time="2025-05-13T00:15:37.886565972Z" level=error msg="encountered an error cleaning up failed sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:37.886707 env[1212]: time="2025-05-13T00:15:37.886667195Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wg7hs,Uid:44e13a95-a792-40e7-82f9-58a1c59c3031,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:37.886934 kubelet[1951]: E0513 00:15:37.886871 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:37.887160 kubelet[1951]: E0513 00:15:37.886945 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wg7hs" May 13 00:15:37.887160 kubelet[1951]: E0513 00:15:37.886964 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wg7hs" May 13 00:15:37.887160 kubelet[1951]: E0513 00:15:37.887001 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wg7hs_calico-system(44e13a95-a792-40e7-82f9-58a1c59c3031)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wg7hs_calico-system(44e13a95-a792-40e7-82f9-58a1c59c3031)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wg7hs" podUID="44e13a95-a792-40e7-82f9-58a1c59c3031" May 13 00:15:37.930996 kubelet[1951]: I0513 00:15:37.930959 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:15:37.931666 env[1212]: time="2025-05-13T00:15:37.931604062Z" level=info msg="StopPodSandbox for \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\"" May 13 00:15:37.963321 env[1212]: time="2025-05-13T00:15:37.963264315Z" level=error msg="StopPodSandbox for \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\" failed" error="failed to destroy network for sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:15:37.963726 kubelet[1951]: E0513 00:15:37.963668 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:15:37.963800 kubelet[1951]: E0513 00:15:37.963721 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3"} May 13 00:15:37.963800 kubelet[1951]: E0513 00:15:37.963755 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"44e13a95-a792-40e7-82f9-58a1c59c3031\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:15:37.963800 kubelet[1951]: E0513 00:15:37.963782 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"44e13a95-a792-40e7-82f9-58a1c59c3031\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wg7hs" podUID="44e13a95-a792-40e7-82f9-58a1c59c3031" May 13 00:15:42.205119 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2450747249.mount: Deactivated successfully. May 13 00:15:42.421439 env[1212]: time="2025-05-13T00:15:42.421391620Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:42.422736 env[1212]: time="2025-05-13T00:15:42.422702538Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:42.426321 env[1212]: time="2025-05-13T00:15:42.426234900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:42.427847 env[1212]: time="2025-05-13T00:15:42.427808545Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:42.428490 env[1212]: time="2025-05-13T00:15:42.428455543Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 13 00:15:42.445594 env[1212]: time="2025-05-13T00:15:42.445547806Z" level=info msg="CreateContainer within sandbox \"17362d46b4f7dc012ce8152e82171904533e433d0134b9ab9f40a0d55a31990d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:15:42.468849 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1931775827.mount: Deactivated successfully. May 13 00:15:42.472797 env[1212]: time="2025-05-13T00:15:42.472735462Z" level=info msg="CreateContainer within sandbox \"17362d46b4f7dc012ce8152e82171904533e433d0134b9ab9f40a0d55a31990d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"349632db60c8892e288aa90279ef9a79f14e22d64a216781efd98f9928310016\"" May 13 00:15:42.473433 env[1212]: time="2025-05-13T00:15:42.473319328Z" level=info msg="StartContainer for \"349632db60c8892e288aa90279ef9a79f14e22d64a216781efd98f9928310016\"" May 13 00:15:42.488597 systemd[1]: Started cri-containerd-349632db60c8892e288aa90279ef9a79f14e22d64a216781efd98f9928310016.scope. May 13 00:15:42.535108 kernel: audit: type=1400 audit(1747095342.523:1010): avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.535254 kernel: audit: type=1300 audit(1747095342.523:1010): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2443 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:42.535307 kernel: audit: type=1327 audit(1747095342.523:1010): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334393633326462363063383839326532383861613930323739656639 May 13 00:15:42.535325 kernel: audit: type=1400 audit(1747095342.523:1011): avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.535346 kernel: audit: type=1400 audit(1747095342.523:1011): avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit[3132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2443 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:42.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334393633326462363063383839326532383861613930323739656639 May 13 00:15:42.523000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.535617 kernel: audit: type=1400 audit(1747095342.523:1011): avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.539132 kernel: audit: type=1400 audit(1747095342.523:1011): avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.541054 kernel: audit: type=1400 audit(1747095342.523:1011): avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.543170 kernel: audit: type=1400 audit(1747095342.523:1011): avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.543251 kernel: audit: type=1400 audit(1747095342.523:1011): avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.523000 audit: BPF prog-id=139 op=LOAD May 13 00:15:42.523000 audit[3132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2443 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:42.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334393633326462363063383839326532383861613930323739656639 May 13 00:15:42.525000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.525000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.525000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.525000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.525000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.525000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.525000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.525000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.525000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.525000 audit: BPF prog-id=140 op=LOAD May 13 00:15:42.525000 audit[3132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2443 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:42.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334393633326462363063383839326532383861613930323739656639 May 13 00:15:42.528000 audit: BPF prog-id=140 op=UNLOAD May 13 00:15:42.528000 audit: BPF prog-id=139 op=UNLOAD May 13 00:15:42.528000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.528000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.528000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.528000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.528000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.528000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.528000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.528000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.528000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.528000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:42.528000 audit: BPF prog-id=141 op=LOAD May 13 00:15:42.528000 audit[3132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2443 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:42.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334393633326462363063383839326532383861613930323739656639 May 13 00:15:42.573724 env[1212]: time="2025-05-13T00:15:42.573662667Z" level=info msg="StartContainer for \"349632db60c8892e288aa90279ef9a79f14e22d64a216781efd98f9928310016\" returns successfully" May 13 00:15:42.726559 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:15:42.726694 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:15:42.942856 kubelet[1951]: E0513 00:15:42.942815 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:42.963032 kubelet[1951]: I0513 00:15:42.962966 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-j7m72" podStartSLOduration=1.285569696 podStartE2EDuration="14.962950106s" podCreationTimestamp="2025-05-13 00:15:28 +0000 UTC" firstStartedPulling="2025-05-13 00:15:28.753385512 +0000 UTC m=+13.022629310" lastFinishedPulling="2025-05-13 00:15:42.430765962 +0000 UTC m=+26.700009720" observedRunningTime="2025-05-13 00:15:42.962630408 +0000 UTC m=+27.231874246" watchObservedRunningTime="2025-05-13 00:15:42.962950106 +0000 UTC m=+27.232193904" May 13 00:15:43.944008 kubelet[1951]: I0513 00:15:43.943966 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:15:43.944403 kubelet[1951]: E0513 00:15:43.944380 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:44.011000 audit[3241]: AVC avc: denied { write } for pid=3241 comm="tee" name="fd" dev="proc" ino=18410 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:15:44.011000 audit[3241]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffdf76a17 a2=241 a3=1b6 items=1 ppid=3212 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:44.011000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:15:44.011000 audit: PATH item=0 name="/dev/fd/63" inode=16160 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:15:44.011000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:15:44.012000 audit[3243]: AVC avc: denied { write } for pid=3243 comm="tee" name="fd" dev="proc" ino=18414 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:15:44.012000 audit[3243]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffff67a26 a2=241 a3=1b6 items=1 ppid=3199 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:44.012000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:15:44.012000 audit: PATH item=0 name="/dev/fd/63" inode=19055 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:15:44.012000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:15:44.014000 audit[3252]: AVC avc: denied { write } for pid=3252 comm="tee" name="fd" dev="proc" ino=17251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:15:44.014000 audit[3252]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff7eeba26 a2=241 a3=1b6 items=1 ppid=3206 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:44.014000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:15:44.014000 audit: PATH item=0 name="/dev/fd/63" inode=18416 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:15:44.014000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:15:44.019000 audit[3255]: AVC avc: denied { write } for pid=3255 comm="tee" name="fd" dev="proc" ino=16165 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:15:44.019000 audit[3255]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff807ea27 a2=241 a3=1b6 items=1 ppid=3204 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:44.019000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:15:44.019000 audit: PATH item=0 name="/dev/fd/63" inode=18419 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:15:44.019000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:15:44.025000 audit[3267]: AVC avc: denied { write } for pid=3267 comm="tee" name="fd" dev="proc" ino=16172 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:15:44.025000 audit[3267]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdd83ca16 a2=241 a3=1b6 items=1 ppid=3202 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:44.025000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:15:44.025000 audit: PATH item=0 name="/dev/fd/63" inode=18422 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:15:44.025000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:15:44.041000 audit[3274]: AVC avc: denied { write } for pid=3274 comm="tee" name="fd" dev="proc" ino=16178 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:15:44.041000 audit[3274]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff5eb9a26 a2=241 a3=1b6 items=1 ppid=3208 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:44.041000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:15:44.041000 audit: PATH item=0 name="/dev/fd/63" inode=16167 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:15:44.041000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:15:44.057000 audit[3279]: AVC avc: denied { write } for pid=3279 comm="tee" name="fd" dev="proc" ino=18428 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:15:44.057000 audit[3279]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd575ca28 a2=241 a3=1b6 items=1 ppid=3198 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:44.057000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:15:44.057000 audit: PATH item=0 name="/dev/fd/63" inode=18425 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:15:44.057000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:15:44.407604 systemd[1]: Started sshd@7-10.0.0.7:22-10.0.0.1:53222.service. May 13 00:15:44.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.7:22-10.0.0.1:53222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:44.463000 audit[3289]: USER_ACCT pid=3289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:44.464393 sshd[3289]: Accepted publickey for core from 10.0.0.1 port 53222 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:15:44.464000 audit[3289]: CRED_ACQ pid=3289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:44.465000 audit[3289]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff150bc20 a2=3 a3=1 items=0 ppid=1 pid=3289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:44.465000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:15:44.465725 sshd[3289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:15:44.469666 systemd-logind[1198]: New session 8 of user core. May 13 00:15:44.470077 systemd[1]: Started session-8.scope. May 13 00:15:44.474000 audit[3289]: USER_START pid=3289 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:44.475000 audit[3291]: CRED_ACQ pid=3291 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:44.653764 sshd[3289]: pam_unix(sshd:session): session closed for user core May 13 00:15:44.655000 audit[3289]: USER_END pid=3289 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:44.655000 audit[3289]: CRED_DISP pid=3289 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:44.656823 systemd[1]: sshd@7-10.0.0.7:22-10.0.0.1:53222.service: Deactivated successfully. May 13 00:15:44.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.7:22-10.0.0.1:53222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:44.657625 systemd[1]: session-8.scope: Deactivated successfully. May 13 00:15:44.658350 systemd-logind[1198]: Session 8 logged out. Waiting for processes to exit. May 13 00:15:44.659395 systemd-logind[1198]: Removed session 8. May 13 00:15:48.828767 env[1212]: time="2025-05-13T00:15:48.828720300Z" level=info msg="StopPodSandbox for \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\"" May 13 00:15:48.829174 env[1212]: time="2025-05-13T00:15:48.828772387Z" level=info msg="StopPodSandbox for \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\"" May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:48.977 [INFO][3434] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:48.977 [INFO][3434] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" iface="eth0" netns="/var/run/netns/cni-1dccb377-c952-cf2d-b2de-8f41d76d79ca" May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:48.977 [INFO][3434] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" iface="eth0" netns="/var/run/netns/cni-1dccb377-c952-cf2d-b2de-8f41d76d79ca" May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:48.978 [INFO][3434] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" iface="eth0" netns="/var/run/netns/cni-1dccb377-c952-cf2d-b2de-8f41d76d79ca" May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:48.978 [INFO][3434] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:48.978 [INFO][3434] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:49.224 [INFO][3457] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" HandleID="k8s-pod-network.9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:49.231 [INFO][3457] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:49.231 [INFO][3457] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:49.258 [WARNING][3457] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" HandleID="k8s-pod-network.9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:49.258 [INFO][3457] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" HandleID="k8s-pod-network.9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:49.260 [INFO][3457] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:49.269718 env[1212]: 2025-05-13 00:15:49.265 [INFO][3434] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:15:49.272070 systemd[1]: run-netns-cni\x2d1dccb377\x2dc952\x2dcf2d\x2db2de\x2d8f41d76d79ca.mount: Deactivated successfully. May 13 00:15:49.272962 env[1212]: time="2025-05-13T00:15:49.272615557Z" level=info msg="TearDown network for sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\" successfully" May 13 00:15:49.272962 env[1212]: time="2025-05-13T00:15:49.272878114Z" level=info msg="StopPodSandbox for \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\" returns successfully" May 13 00:15:49.274279 env[1212]: time="2025-05-13T00:15:49.274242787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66676fbdf9-qhj5k,Uid:f3b54bbc-97b4-4186-b0e1-1275f78689f8,Namespace:calico-apiserver,Attempt:1,}" May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:48.976 [INFO][3439] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:48.977 [INFO][3439] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" iface="eth0" netns="/var/run/netns/cni-0c2a5211-8309-c7ff-4a73-b2410c49dced" May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:48.977 [INFO][3439] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" iface="eth0" netns="/var/run/netns/cni-0c2a5211-8309-c7ff-4a73-b2410c49dced" May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:48.978 [INFO][3439] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" iface="eth0" netns="/var/run/netns/cni-0c2a5211-8309-c7ff-4a73-b2410c49dced" May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:48.978 [INFO][3439] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:48.978 [INFO][3439] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:49.224 [INFO][3456] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" HandleID="k8s-pod-network.3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:49.231 [INFO][3456] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:49.260 [INFO][3456] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:49.275 [WARNING][3456] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" HandleID="k8s-pod-network.3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:49.275 [INFO][3456] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" HandleID="k8s-pod-network.3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:49.277 [INFO][3456] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:49.281827 env[1212]: 2025-05-13 00:15:49.280 [INFO][3439] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:15:49.283379 env[1212]: time="2025-05-13T00:15:49.283337149Z" level=info msg="TearDown network for sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\" successfully" May 13 00:15:49.283480 env[1212]: time="2025-05-13T00:15:49.283458726Z" level=info msg="StopPodSandbox for \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\" returns successfully" May 13 00:15:49.283861 kubelet[1951]: E0513 00:15:49.283803 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:49.283975 systemd[1]: run-netns-cni\x2d0c2a5211\x2d8309\x2dc7ff\x2d4a73\x2db2410c49dced.mount: Deactivated successfully. May 13 00:15:49.284920 env[1212]: time="2025-05-13T00:15:49.284884167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-kh2hc,Uid:b7eaf24b-58d9-45e5-b364-5ba55a087a71,Namespace:kube-system,Attempt:1,}" May 13 00:15:49.485087 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:15:49.485256 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calide3580597b8: link becomes ready May 13 00:15:49.483443 systemd-networkd[1052]: calide3580597b8: Link UP May 13 00:15:49.486359 systemd-networkd[1052]: calide3580597b8: Gained carrier May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.324 [INFO][3474] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.342 [INFO][3474] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0 calico-apiserver-66676fbdf9- calico-apiserver f3b54bbc-97b4-4186-b0e1-1275f78689f8 799 0 2025-05-13 00:15:27 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:66676fbdf9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-66676fbdf9-qhj5k eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calide3580597b8 [] []}} ContainerID="5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-qhj5k" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.342 [INFO][3474] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-qhj5k" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.374 [INFO][3502] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" HandleID="k8s-pod-network.5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.392 [INFO][3502] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" HandleID="k8s-pod-network.5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029b2b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-66676fbdf9-qhj5k", "timestamp":"2025-05-13 00:15:49.374675069 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.395 [INFO][3502] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.395 [INFO][3502] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.395 [INFO][3502] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.400 [INFO][3502] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" host="localhost" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.428 [INFO][3502] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.439 [INFO][3502] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.441 [INFO][3502] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.444 [INFO][3502] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.444 [INFO][3502] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" host="localhost" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.452 [INFO][3502] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.457 [INFO][3502] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" host="localhost" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.466 [INFO][3502] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" host="localhost" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.466 [INFO][3502] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" host="localhost" May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.466 [INFO][3502] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:49.498048 env[1212]: 2025-05-13 00:15:49.466 [INFO][3502] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" HandleID="k8s-pod-network.5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:15:49.498770 env[1212]: 2025-05-13 00:15:49.469 [INFO][3474] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-qhj5k" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0", GenerateName:"calico-apiserver-66676fbdf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"f3b54bbc-97b4-4186-b0e1-1275f78689f8", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66676fbdf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-66676fbdf9-qhj5k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calide3580597b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:49.498770 env[1212]: 2025-05-13 00:15:49.469 [INFO][3474] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-qhj5k" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:15:49.498770 env[1212]: 2025-05-13 00:15:49.469 [INFO][3474] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calide3580597b8 ContainerID="5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-qhj5k" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:15:49.498770 env[1212]: 2025-05-13 00:15:49.485 [INFO][3474] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-qhj5k" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:15:49.498770 env[1212]: 2025-05-13 00:15:49.485 [INFO][3474] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-qhj5k" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0", GenerateName:"calico-apiserver-66676fbdf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"f3b54bbc-97b4-4186-b0e1-1275f78689f8", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66676fbdf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f", Pod:"calico-apiserver-66676fbdf9-qhj5k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calide3580597b8", MAC:"62:bd:c2:49:f6:aa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:49.498770 env[1212]: 2025-05-13 00:15:49.495 [INFO][3474] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-qhj5k" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:15:49.514522 env[1212]: time="2025-05-13T00:15:49.514043482Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:49.514522 env[1212]: time="2025-05-13T00:15:49.514095690Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:49.514522 env[1212]: time="2025-05-13T00:15:49.514108331Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:49.514522 env[1212]: time="2025-05-13T00:15:49.514382810Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f pid=3563 runtime=io.containerd.runc.v2 May 13 00:15:49.528207 systemd[1]: Started cri-containerd-5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f.scope. May 13 00:15:49.596379 systemd-networkd[1052]: cali5edb6773638: Link UP May 13 00:15:49.597527 systemd-networkd[1052]: cali5edb6773638: Gained carrier May 13 00:15:49.598232 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5edb6773638: link becomes ready May 13 00:15:49.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.616861 kernel: kauditd_printk_skb: 79 callbacks suppressed May 13 00:15:49.616968 kernel: audit: type=1400 audit(1747095349.613:1032): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.617008 kernel: audit: type=1400 audit(1747095349.613:1033): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.620781 kernel: audit: type=1400 audit(1747095349.613:1034): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.620853 kernel: audit: type=1400 audit(1747095349.613:1035): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.624919 kernel: audit: type=1400 audit(1747095349.613:1036): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.627466 kernel: audit: type=1400 audit(1747095349.613:1037): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.627581 kernel: audit: type=1400 audit(1747095349.613:1038): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.631476 kernel: audit: type=1400 audit(1747095349.613:1039): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.631555 kernel: audit: type=1400 audit(1747095349.613:1040): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.631810 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:15:49.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.636207 kernel: audit: type=1400 audit(1747095349.613:1041): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.613000 audit: BPF prog-id=142 op=LOAD May 13 00:15:49.614000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3563 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633461346238396539643566353263623962363663636437373633 May 13 00:15:49.614000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3563 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633461346238396539643566353263623962363663636437373633 May 13 00:15:49.614000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.614000 audit: BPF prog-id=143 op=LOAD May 13 00:15:49.614000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3563 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633461346238396539643566353263623962363663636437373633 May 13 00:15:49.615000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.615000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.615000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.615000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.615000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.615000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.615000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.615000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.615000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.615000 audit: BPF prog-id=144 op=LOAD May 13 00:15:49.615000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3563 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633461346238396539643566353263623962363663636437373633 May 13 00:15:49.617000 audit: BPF prog-id=144 op=UNLOAD May 13 00:15:49.617000 audit: BPF prog-id=143 op=UNLOAD May 13 00:15:49.617000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.617000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.617000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.617000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.617000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.617000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.617000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.617000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.617000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.617000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.617000 audit: BPF prog-id=145 op=LOAD May 13 00:15:49.617000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3563 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633461346238396539643566353263623962363663636437373633 May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.332 [INFO][3486] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.349 [INFO][3486] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0 coredns-6f6b679f8f- kube-system b7eaf24b-58d9-45e5-b364-5ba55a087a71 800 0 2025-05-13 00:15:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-kh2hc eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5edb6773638 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" Namespace="kube-system" Pod="coredns-6f6b679f8f-kh2hc" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kh2hc-" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.349 [INFO][3486] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" Namespace="kube-system" Pod="coredns-6f6b679f8f-kh2hc" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.397 [INFO][3508] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" HandleID="k8s-pod-network.f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.417 [INFO][3508] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" HandleID="k8s-pod-network.f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004b0130), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-kh2hc", "timestamp":"2025-05-13 00:15:49.397947911 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.417 [INFO][3508] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.466 [INFO][3508] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.467 [INFO][3508] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.501 [INFO][3508] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" host="localhost" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.506 [INFO][3508] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.546 [INFO][3508] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.550 [INFO][3508] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.557 [INFO][3508] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.557 [INFO][3508] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" host="localhost" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.564 [INFO][3508] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3 May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.571 [INFO][3508] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" host="localhost" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.580 [INFO][3508] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" host="localhost" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.580 [INFO][3508] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" host="localhost" May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.581 [INFO][3508] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:49.639185 env[1212]: 2025-05-13 00:15:49.581 [INFO][3508] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" HandleID="k8s-pod-network.f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:15:49.639788 env[1212]: 2025-05-13 00:15:49.583 [INFO][3486] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" Namespace="kube-system" Pod="coredns-6f6b679f8f-kh2hc" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b7eaf24b-58d9-45e5-b364-5ba55a087a71", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-kh2hc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5edb6773638", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:49.639788 env[1212]: 2025-05-13 00:15:49.583 [INFO][3486] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" Namespace="kube-system" Pod="coredns-6f6b679f8f-kh2hc" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:15:49.639788 env[1212]: 2025-05-13 00:15:49.583 [INFO][3486] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5edb6773638 ContainerID="f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" Namespace="kube-system" Pod="coredns-6f6b679f8f-kh2hc" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:15:49.639788 env[1212]: 2025-05-13 00:15:49.597 [INFO][3486] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" Namespace="kube-system" Pod="coredns-6f6b679f8f-kh2hc" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:15:49.639788 env[1212]: 2025-05-13 00:15:49.598 [INFO][3486] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" Namespace="kube-system" Pod="coredns-6f6b679f8f-kh2hc" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b7eaf24b-58d9-45e5-b364-5ba55a087a71", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3", Pod:"coredns-6f6b679f8f-kh2hc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5edb6773638", MAC:"5e:0e:6e:d6:f7:88", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:49.639788 env[1212]: 2025-05-13 00:15:49.636 [INFO][3486] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3" Namespace="kube-system" Pod="coredns-6f6b679f8f-kh2hc" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:15:49.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.7:22-10.0.0.1:53226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:49.659195 systemd[1]: Started sshd@8-10.0.0.7:22-10.0.0.1:53226.service. May 13 00:15:49.660040 env[1212]: time="2025-05-13T00:15:49.659949777Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:49.660040 env[1212]: time="2025-05-13T00:15:49.660002185Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:49.660040 env[1212]: time="2025-05-13T00:15:49.660013786Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:49.660433 env[1212]: time="2025-05-13T00:15:49.660372277Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3 pid=3618 runtime=io.containerd.runc.v2 May 13 00:15:49.661083 env[1212]: time="2025-05-13T00:15:49.661036010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66676fbdf9-qhj5k,Uid:f3b54bbc-97b4-4186-b0e1-1275f78689f8,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f\"" May 13 00:15:49.668922 env[1212]: time="2025-05-13T00:15:49.668829870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:15:49.678157 systemd[1]: Started cri-containerd-f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3.scope. May 13 00:15:49.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.707000 audit: BPF prog-id=146 op=LOAD May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3618 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630326635636535343931616636663562343234366232353430636163 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3618 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630326635636535343931616636663562343234366232353430636163 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit: BPF prog-id=147 op=LOAD May 13 00:15:49.708000 audit[3630]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3618 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630326635636535343931616636663562343234366232353430636163 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit: BPF prog-id=148 op=LOAD May 13 00:15:49.708000 audit[3630]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3618 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630326635636535343931616636663562343234366232353430636163 May 13 00:15:49.708000 audit: BPF prog-id=148 op=UNLOAD May 13 00:15:49.708000 audit: BPF prog-id=147 op=UNLOAD May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.708000 audit: BPF prog-id=149 op=LOAD May 13 00:15:49.708000 audit[3630]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3618 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630326635636535343931616636663562343234366232353430636163 May 13 00:15:49.710584 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:15:49.710000 audit[3624]: USER_ACCT pid=3624 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:49.711880 sshd[3624]: Accepted publickey for core from 10.0.0.1 port 53226 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:15:49.711000 audit[3624]: CRED_ACQ pid=3624 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:49.712000 audit[3624]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffff82e700 a2=3 a3=1 items=0 ppid=1 pid=3624 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.712000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:15:49.713564 sshd[3624]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:15:49.717351 systemd-logind[1198]: New session 9 of user core. May 13 00:15:49.718261 systemd[1]: Started session-9.scope. May 13 00:15:49.723000 audit[3624]: USER_START pid=3624 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:49.724000 audit[3648]: CRED_ACQ pid=3648 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:49.737304 env[1212]: time="2025-05-13T00:15:49.737256199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-kh2hc,Uid:b7eaf24b-58d9-45e5-b364-5ba55a087a71,Namespace:kube-system,Attempt:1,} returns sandbox id \"f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3\"" May 13 00:15:49.737995 kubelet[1951]: E0513 00:15:49.737970 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:49.741024 env[1212]: time="2025-05-13T00:15:49.740972763Z" level=info msg="CreateContainer within sandbox \"f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:15:49.752038 env[1212]: time="2025-05-13T00:15:49.751980195Z" level=info msg="CreateContainer within sandbox \"f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7b9de1c05bff6ef60fab6e897509258bb339006e3497d7f54db39a3b11a8e73b\"" May 13 00:15:49.753547 env[1212]: time="2025-05-13T00:15:49.752488987Z" level=info msg="StartContainer for \"7b9de1c05bff6ef60fab6e897509258bb339006e3497d7f54db39a3b11a8e73b\"" May 13 00:15:49.765278 systemd[1]: Started cri-containerd-7b9de1c05bff6ef60fab6e897509258bb339006e3497d7f54db39a3b11a8e73b.scope. May 13 00:15:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.788000 audit: BPF prog-id=150 op=LOAD May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3618 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762396465316330356266663665663630666162366538393735303932 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3618 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762396465316330356266663665663630666162366538393735303932 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit: BPF prog-id=151 op=LOAD May 13 00:15:49.791000 audit[3662]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3618 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762396465316330356266663665663630666162366538393735303932 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit: BPF prog-id=152 op=LOAD May 13 00:15:49.791000 audit[3662]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3618 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762396465316330356266663665663630666162366538393735303932 May 13 00:15:49.791000 audit: BPF prog-id=152 op=UNLOAD May 13 00:15:49.791000 audit: BPF prog-id=151 op=UNLOAD May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:49.791000 audit: BPF prog-id=153 op=LOAD May 13 00:15:49.791000 audit[3662]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3618 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:49.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762396465316330356266663665663630666162366538393735303932 May 13 00:15:49.806153 env[1212]: time="2025-05-13T00:15:49.806057261Z" level=info msg="StartContainer for \"7b9de1c05bff6ef60fab6e897509258bb339006e3497d7f54db39a3b11a8e73b\" returns successfully" May 13 00:15:49.872539 sshd[3624]: pam_unix(sshd:session): session closed for user core May 13 00:15:49.872000 audit[3624]: USER_END pid=3624 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:49.872000 audit[3624]: CRED_DISP pid=3624 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:49.875620 systemd-logind[1198]: Session 9 logged out. Waiting for processes to exit. May 13 00:15:49.875955 systemd[1]: sshd@8-10.0.0.7:22-10.0.0.1:53226.service: Deactivated successfully. May 13 00:15:49.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.7:22-10.0.0.1:53226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:49.876734 systemd[1]: session-9.scope: Deactivated successfully. May 13 00:15:49.878373 systemd-logind[1198]: Removed session 9. May 13 00:15:49.957490 kubelet[1951]: E0513 00:15:49.957460 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:49.975499 kubelet[1951]: I0513 00:15:49.975433 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-kh2hc" podStartSLOduration=27.975413943 podStartE2EDuration="27.975413943s" podCreationTimestamp="2025-05-13 00:15:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:15:49.971247915 +0000 UTC m=+34.240491753" watchObservedRunningTime="2025-05-13 00:15:49.975413943 +0000 UTC m=+34.244657741" May 13 00:15:50.003000 audit[3704]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=3704 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:50.003000 audit[3704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffce745940 a2=0 a3=1 items=0 ppid=2094 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:50.003000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:50.013000 audit[3704]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3704 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:50.013000 audit[3704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffce745940 a2=0 a3=1 items=0 ppid=2094 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:50.013000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:50.036000 audit[3706]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=3706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:50.036000 audit[3706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd785d620 a2=0 a3=1 items=0 ppid=2094 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:50.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:50.047000 audit[3706]: NETFILTER_CFG table=nat:98 family=2 entries=33 op=nft_register_chain pid=3706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:50.047000 audit[3706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffd785d620 a2=0 a3=1 items=0 ppid=2094 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:50.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:50.829359 env[1212]: time="2025-05-13T00:15:50.829304080Z" level=info msg="StopPodSandbox for \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\"" May 13 00:15:50.829850 env[1212]: time="2025-05-13T00:15:50.829823471Z" level=info msg="StopPodSandbox for \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\"" May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.890 [INFO][3766] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.890 [INFO][3766] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" iface="eth0" netns="/var/run/netns/cni-009459b7-52b8-f84d-e138-293294ea6f2a" May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.890 [INFO][3766] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" iface="eth0" netns="/var/run/netns/cni-009459b7-52b8-f84d-e138-293294ea6f2a" May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.891 [INFO][3766] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" iface="eth0" netns="/var/run/netns/cni-009459b7-52b8-f84d-e138-293294ea6f2a" May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.891 [INFO][3766] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.891 [INFO][3766] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.930 [INFO][3782] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" HandleID="k8s-pod-network.41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.930 [INFO][3782] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.931 [INFO][3782] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.940 [WARNING][3782] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" HandleID="k8s-pod-network.41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.941 [INFO][3782] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" HandleID="k8s-pod-network.41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.944 [INFO][3782] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:50.953352 env[1212]: 2025-05-13 00:15:50.950 [INFO][3766] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:15:50.956227 env[1212]: time="2025-05-13T00:15:50.955324252Z" level=info msg="TearDown network for sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\" successfully" May 13 00:15:50.956227 env[1212]: time="2025-05-13T00:15:50.955363097Z" level=info msg="StopPodSandbox for \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\" returns successfully" May 13 00:15:50.956238 systemd[1]: run-netns-cni\x2d009459b7\x2d52b8\x2df84d\x2de138\x2d293294ea6f2a.mount: Deactivated successfully. May 13 00:15:50.956635 env[1212]: time="2025-05-13T00:15:50.956589785Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7599cddf5c-qcxfq,Uid:d0fc6189-5541-4d79-b8a2-4b772da81d19,Namespace:calico-system,Attempt:1,}" May 13 00:15:50.962254 kubelet[1951]: E0513 00:15:50.962221 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.902 [INFO][3765] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.902 [INFO][3765] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" iface="eth0" netns="/var/run/netns/cni-5a64601e-d830-0acb-2af4-944cd6fb29ed" May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.902 [INFO][3765] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" iface="eth0" netns="/var/run/netns/cni-5a64601e-d830-0acb-2af4-944cd6fb29ed" May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.903 [INFO][3765] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" iface="eth0" netns="/var/run/netns/cni-5a64601e-d830-0acb-2af4-944cd6fb29ed" May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.903 [INFO][3765] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.903 [INFO][3765] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.931 [INFO][3788] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" HandleID="k8s-pod-network.5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.931 [INFO][3788] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.944 [INFO][3788] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.959 [WARNING][3788] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" HandleID="k8s-pod-network.5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.959 [INFO][3788] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" HandleID="k8s-pod-network.5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.961 [INFO][3788] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:50.976354 env[1212]: 2025-05-13 00:15:50.971 [INFO][3765] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:15:50.979018 systemd[1]: run-netns-cni\x2d5a64601e\x2dd830\x2d0acb\x2d2af4\x2d944cd6fb29ed.mount: Deactivated successfully. May 13 00:15:50.979516 env[1212]: time="2025-05-13T00:15:50.979462708Z" level=info msg="TearDown network for sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\" successfully" May 13 00:15:50.979680 env[1212]: time="2025-05-13T00:15:50.979660936Z" level=info msg="StopPodSandbox for \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\" returns successfully" May 13 00:15:50.981428 env[1212]: time="2025-05-13T00:15:50.981381891Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66676fbdf9-48jcd,Uid:51abde12-be7a-4fec-9e5c-125c65b05aea,Namespace:calico-apiserver,Attempt:1,}" May 13 00:15:51.032372 systemd-networkd[1052]: cali5edb6773638: Gained IPv6LL May 13 00:15:51.133125 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:15:51.133293 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic88b30ff79a: link becomes ready May 13 00:15:51.131636 systemd-networkd[1052]: calic88b30ff79a: Link UP May 13 00:15:51.133248 systemd-networkd[1052]: calic88b30ff79a: Gained carrier May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.010 [INFO][3799] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.030 [INFO][3799] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0 calico-kube-controllers-7599cddf5c- calico-system d0fc6189-5541-4d79-b8a2-4b772da81d19 838 0 2025-05-13 00:15:28 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7599cddf5c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7599cddf5c-qcxfq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calic88b30ff79a [] []}} ContainerID="39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" Namespace="calico-system" Pod="calico-kube-controllers-7599cddf5c-qcxfq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.030 [INFO][3799] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" Namespace="calico-system" Pod="calico-kube-controllers-7599cddf5c-qcxfq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.071 [INFO][3827] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" HandleID="k8s-pod-network.39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.085 [INFO][3827] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" HandleID="k8s-pod-network.39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000502e90), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7599cddf5c-qcxfq", "timestamp":"2025-05-13 00:15:51.071320278 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.085 [INFO][3827] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.087 [INFO][3827] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.087 [INFO][3827] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.096 [INFO][3827] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" host="localhost" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.101 [INFO][3827] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.108 [INFO][3827] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.110 [INFO][3827] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.112 [INFO][3827] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.113 [INFO][3827] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" host="localhost" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.115 [INFO][3827] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.119 [INFO][3827] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" host="localhost" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.125 [INFO][3827] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" host="localhost" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.125 [INFO][3827] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" host="localhost" May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.125 [INFO][3827] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:51.144496 env[1212]: 2025-05-13 00:15:51.125 [INFO][3827] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" HandleID="k8s-pod-network.39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:15:51.145322 env[1212]: 2025-05-13 00:15:51.128 [INFO][3799] cni-plugin/k8s.go 386: Populated endpoint ContainerID="39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" Namespace="calico-system" Pod="calico-kube-controllers-7599cddf5c-qcxfq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0", GenerateName:"calico-kube-controllers-7599cddf5c-", Namespace:"calico-system", SelfLink:"", UID:"d0fc6189-5541-4d79-b8a2-4b772da81d19", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7599cddf5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7599cddf5c-qcxfq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic88b30ff79a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:51.145322 env[1212]: 2025-05-13 00:15:51.128 [INFO][3799] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" Namespace="calico-system" Pod="calico-kube-controllers-7599cddf5c-qcxfq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:15:51.145322 env[1212]: 2025-05-13 00:15:51.128 [INFO][3799] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic88b30ff79a ContainerID="39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" Namespace="calico-system" Pod="calico-kube-controllers-7599cddf5c-qcxfq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:15:51.145322 env[1212]: 2025-05-13 00:15:51.133 [INFO][3799] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" Namespace="calico-system" Pod="calico-kube-controllers-7599cddf5c-qcxfq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:15:51.145322 env[1212]: 2025-05-13 00:15:51.133 [INFO][3799] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" Namespace="calico-system" Pod="calico-kube-controllers-7599cddf5c-qcxfq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0", GenerateName:"calico-kube-controllers-7599cddf5c-", Namespace:"calico-system", SelfLink:"", UID:"d0fc6189-5541-4d79-b8a2-4b772da81d19", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7599cddf5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec", Pod:"calico-kube-controllers-7599cddf5c-qcxfq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic88b30ff79a", MAC:"92:7b:b4:e3:47:26", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:51.145322 env[1212]: 2025-05-13 00:15:51.142 [INFO][3799] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec" Namespace="calico-system" Pod="calico-kube-controllers-7599cddf5c-qcxfq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:15:51.176104 env[1212]: time="2025-05-13T00:15:51.176030384Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:51.176327 env[1212]: time="2025-05-13T00:15:51.176073390Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:51.176445 env[1212]: time="2025-05-13T00:15:51.176412835Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:51.176708 env[1212]: time="2025-05-13T00:15:51.176673469Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec pid=3865 runtime=io.containerd.runc.v2 May 13 00:15:51.203613 systemd[1]: Started cri-containerd-39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec.scope. May 13 00:15:51.225521 systemd-networkd[1052]: calide3580597b8: Gained IPv6LL May 13 00:15:51.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit: BPF prog-id=154 op=LOAD May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3865 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:51.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339636533393534313134656539323439333331356539383635373939 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3865 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:51.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339636533393534313134656539323439333331356539383635373939 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.246273 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0f7699b1e6f: link becomes ready May 13 00:15:51.241000 audit: BPF prog-id=155 op=LOAD May 13 00:15:51.241000 audit[3875]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3865 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:51.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339636533393534313134656539323439333331356539383635373939 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit: BPF prog-id=156 op=LOAD May 13 00:15:51.241000 audit[3875]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3865 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:51.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339636533393534313134656539323439333331356539383635373939 May 13 00:15:51.241000 audit: BPF prog-id=156 op=UNLOAD May 13 00:15:51.241000 audit: BPF prog-id=155 op=UNLOAD May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.241000 audit: BPF prog-id=157 op=LOAD May 13 00:15:51.241000 audit[3875]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3865 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:51.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339636533393534313134656539323439333331356539383635373939 May 13 00:15:51.244721 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:15:51.245851 systemd-networkd[1052]: cali0f7699b1e6f: Link UP May 13 00:15:51.245991 systemd-networkd[1052]: cali0f7699b1e6f: Gained carrier May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.022 [INFO][3811] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.043 [INFO][3811] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0 calico-apiserver-66676fbdf9- calico-apiserver 51abde12-be7a-4fec-9e5c-125c65b05aea 839 0 2025-05-13 00:15:27 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:66676fbdf9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-66676fbdf9-48jcd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0f7699b1e6f [] []}} ContainerID="0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-48jcd" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.043 [INFO][3811] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-48jcd" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.089 [INFO][3834] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" HandleID="k8s-pod-network.0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.103 [INFO][3834] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" HandleID="k8s-pod-network.0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000130200), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-66676fbdf9-48jcd", "timestamp":"2025-05-13 00:15:51.089772722 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.103 [INFO][3834] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.125 [INFO][3834] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.125 [INFO][3834] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.194 [INFO][3834] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" host="localhost" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.204 [INFO][3834] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.217 [INFO][3834] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.219 [INFO][3834] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.221 [INFO][3834] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.221 [INFO][3834] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" host="localhost" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.224 [INFO][3834] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24 May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.229 [INFO][3834] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" host="localhost" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.238 [INFO][3834] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" host="localhost" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.238 [INFO][3834] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" host="localhost" May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.238 [INFO][3834] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:51.288358 env[1212]: 2025-05-13 00:15:51.238 [INFO][3834] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" HandleID="k8s-pod-network.0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:15:51.289013 env[1212]: 2025-05-13 00:15:51.242 [INFO][3811] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-48jcd" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0", GenerateName:"calico-apiserver-66676fbdf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"51abde12-be7a-4fec-9e5c-125c65b05aea", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66676fbdf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-66676fbdf9-48jcd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0f7699b1e6f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:51.289013 env[1212]: 2025-05-13 00:15:51.242 [INFO][3811] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-48jcd" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:15:51.289013 env[1212]: 2025-05-13 00:15:51.242 [INFO][3811] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0f7699b1e6f ContainerID="0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-48jcd" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:15:51.289013 env[1212]: 2025-05-13 00:15:51.243 [INFO][3811] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-48jcd" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:15:51.289013 env[1212]: 2025-05-13 00:15:51.243 [INFO][3811] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-48jcd" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0", GenerateName:"calico-apiserver-66676fbdf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"51abde12-be7a-4fec-9e5c-125c65b05aea", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66676fbdf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24", Pod:"calico-apiserver-66676fbdf9-48jcd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0f7699b1e6f", MAC:"9e:9e:5b:33:b9:a1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:51.289013 env[1212]: 2025-05-13 00:15:51.279 [INFO][3811] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24" Namespace="calico-apiserver" Pod="calico-apiserver-66676fbdf9-48jcd" WorkloadEndpoint="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:15:51.313656 env[1212]: time="2025-05-13T00:15:51.312777452Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:51.313656 env[1212]: time="2025-05-13T00:15:51.312825538Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:51.313656 env[1212]: time="2025-05-13T00:15:51.312836020Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:51.313656 env[1212]: time="2025-05-13T00:15:51.312996281Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24 pid=3911 runtime=io.containerd.runc.v2 May 13 00:15:51.322780 env[1212]: time="2025-05-13T00:15:51.322733170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7599cddf5c-qcxfq,Uid:d0fc6189-5541-4d79-b8a2-4b772da81d19,Namespace:calico-system,Attempt:1,} returns sandbox id \"39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec\"" May 13 00:15:51.334835 systemd[1]: Started cri-containerd-0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24.scope. May 13 00:15:51.338145 systemd[1]: run-containerd-runc-k8s.io-0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24-runc.ewzWVO.mount: Deactivated successfully. May 13 00:15:51.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.370000 audit: BPF prog-id=158 op=LOAD May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3911 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:51.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039313663383631306337653731353464386238343038316139323532 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3911 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:51.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039313663383631306337653731353464386238343038316139323532 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit: BPF prog-id=159 op=LOAD May 13 00:15:51.371000 audit[3924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3911 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:51.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039313663383631306337653731353464386238343038316139323532 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit: BPF prog-id=160 op=LOAD May 13 00:15:51.371000 audit[3924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3911 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:51.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039313663383631306337653731353464386238343038316139323532 May 13 00:15:51.371000 audit: BPF prog-id=160 op=UNLOAD May 13 00:15:51.371000 audit: BPF prog-id=159 op=UNLOAD May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:51.371000 audit: BPF prog-id=161 op=LOAD May 13 00:15:51.371000 audit[3924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3911 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:51.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039313663383631306337653731353464386238343038316139323532 May 13 00:15:51.372442 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:15:51.392314 env[1212]: time="2025-05-13T00:15:51.392167204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66676fbdf9-48jcd,Uid:51abde12-be7a-4fec-9e5c-125c65b05aea,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24\"" May 13 00:15:51.829844 env[1212]: time="2025-05-13T00:15:51.829741147Z" level=info msg="StopPodSandbox for \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\"" May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.878 [INFO][3988] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.878 [INFO][3988] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" iface="eth0" netns="/var/run/netns/cni-ced99765-66f8-716c-d501-8bd52aa035b1" May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.879 [INFO][3988] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" iface="eth0" netns="/var/run/netns/cni-ced99765-66f8-716c-d501-8bd52aa035b1" May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.879 [INFO][3988] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" iface="eth0" netns="/var/run/netns/cni-ced99765-66f8-716c-d501-8bd52aa035b1" May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.879 [INFO][3988] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.879 [INFO][3988] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.903 [INFO][3997] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" HandleID="k8s-pod-network.6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.903 [INFO][3997] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.903 [INFO][3997] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.912 [WARNING][3997] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" HandleID="k8s-pod-network.6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.912 [INFO][3997] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" HandleID="k8s-pod-network.6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.913 [INFO][3997] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:51.917251 env[1212]: 2025-05-13 00:15:51.915 [INFO][3988] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:15:51.918152 env[1212]: time="2025-05-13T00:15:51.918107488Z" level=info msg="TearDown network for sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\" successfully" May 13 00:15:51.918338 env[1212]: time="2025-05-13T00:15:51.918315676Z" level=info msg="StopPodSandbox for \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\" returns successfully" May 13 00:15:51.918716 kubelet[1951]: E0513 00:15:51.918693 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:51.919784 env[1212]: time="2025-05-13T00:15:51.919038452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-dn47n,Uid:6ea7591f-a126-4b28-aaed-48b0d2ffd7ad,Namespace:kube-system,Attempt:1,}" May 13 00:15:51.966234 kubelet[1951]: E0513 00:15:51.966183 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:52.102378 env[1212]: time="2025-05-13T00:15:52.102328604Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:52.108062 env[1212]: time="2025-05-13T00:15:52.108013335Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:52.110202 env[1212]: time="2025-05-13T00:15:52.110162931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:52.118587 env[1212]: time="2025-05-13T00:15:52.118529047Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:52.119107 env[1212]: time="2025-05-13T00:15:52.119069596Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 13 00:15:52.121987 env[1212]: time="2025-05-13T00:15:52.121926843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 13 00:15:52.126673 env[1212]: time="2025-05-13T00:15:52.126619166Z" level=info msg="CreateContainer within sandbox \"5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:15:52.132531 systemd-networkd[1052]: cali88668763942: Link UP May 13 00:15:52.133103 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:15:52.133241 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali88668763942: link becomes ready May 13 00:15:52.133349 systemd-networkd[1052]: cali88668763942: Gained carrier May 13 00:15:52.145275 env[1212]: time="2025-05-13T00:15:52.145186432Z" level=info msg="CreateContainer within sandbox \"5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"14abf9a2f8ec1df046bd4f12840088339f5b9efea3af8b58dd8341445b72ecde\"" May 13 00:15:52.147735 env[1212]: time="2025-05-13T00:15:52.147689034Z" level=info msg="StartContainer for \"14abf9a2f8ec1df046bd4f12840088339f5b9efea3af8b58dd8341445b72ecde\"" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.000 [INFO][4005] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.022 [INFO][4005] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--dn47n-eth0 coredns-6f6b679f8f- kube-system 6ea7591f-a126-4b28-aaed-48b0d2ffd7ad 851 0 2025-05-13 00:15:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-dn47n eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali88668763942 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" Namespace="kube-system" Pod="coredns-6f6b679f8f-dn47n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--dn47n-" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.022 [INFO][4005] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" Namespace="kube-system" Pod="coredns-6f6b679f8f-dn47n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.057 [INFO][4020] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" HandleID="k8s-pod-network.8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.076 [INFO][4020] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" HandleID="k8s-pod-network.8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000308810), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-dn47n", "timestamp":"2025-05-13 00:15:52.05762718 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.076 [INFO][4020] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.076 [INFO][4020] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.076 [INFO][4020] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.079 [INFO][4020] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" host="localhost" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.084 [INFO][4020] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.098 [INFO][4020] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.100 [INFO][4020] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.103 [INFO][4020] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.103 [INFO][4020] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" host="localhost" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.105 [INFO][4020] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.113 [INFO][4020] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" host="localhost" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.124 [INFO][4020] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" host="localhost" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.124 [INFO][4020] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" host="localhost" May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.125 [INFO][4020] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:52.155973 env[1212]: 2025-05-13 00:15:52.125 [INFO][4020] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" HandleID="k8s-pod-network.8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:15:52.157164 env[1212]: 2025-05-13 00:15:52.128 [INFO][4005] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" Namespace="kube-system" Pod="coredns-6f6b679f8f-dn47n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--dn47n-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6ea7591f-a126-4b28-aaed-48b0d2ffd7ad", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-dn47n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali88668763942", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:52.157164 env[1212]: 2025-05-13 00:15:52.129 [INFO][4005] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" Namespace="kube-system" Pod="coredns-6f6b679f8f-dn47n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:15:52.157164 env[1212]: 2025-05-13 00:15:52.129 [INFO][4005] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali88668763942 ContainerID="8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" Namespace="kube-system" Pod="coredns-6f6b679f8f-dn47n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:15:52.157164 env[1212]: 2025-05-13 00:15:52.133 [INFO][4005] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" Namespace="kube-system" Pod="coredns-6f6b679f8f-dn47n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:15:52.157164 env[1212]: 2025-05-13 00:15:52.137 [INFO][4005] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" Namespace="kube-system" Pod="coredns-6f6b679f8f-dn47n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--dn47n-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6ea7591f-a126-4b28-aaed-48b0d2ffd7ad", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b", Pod:"coredns-6f6b679f8f-dn47n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali88668763942", MAC:"ae:8c:8b:d4:dc:3c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:52.157164 env[1212]: 2025-05-13 00:15:52.154 [INFO][4005] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b" Namespace="kube-system" Pod="coredns-6f6b679f8f-dn47n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:15:52.178316 systemd[1]: Started cri-containerd-14abf9a2f8ec1df046bd4f12840088339f5b9efea3af8b58dd8341445b72ecde.scope. May 13 00:15:52.185315 env[1212]: time="2025-05-13T00:15:52.184871453Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:52.185315 env[1212]: time="2025-05-13T00:15:52.184925660Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:52.185315 env[1212]: time="2025-05-13T00:15:52.184936821Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:52.186131 env[1212]: time="2025-05-13T00:15:52.185632110Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b pid=4068 runtime=io.containerd.runc.v2 May 13 00:15:52.237450 systemd[1]: Started cri-containerd-8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b.scope. May 13 00:15:52.275809 systemd[1]: run-netns-cni\x2dced99765\x2d66f8\x2d716c\x2dd501\x2d8bd52aa035b1.mount: Deactivated successfully. May 13 00:15:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit: BPF prog-id=162 op=LOAD May 13 00:15:52.323000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4068 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866663465323561366166346134313363383664646435373839316230 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4068 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866663465323561366166346134313363383664646435373839316230 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit: BPF prog-id=163 op=LOAD May 13 00:15:52.323000 audit[4079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4068 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866663465323561366166346134313363383664646435373839316230 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.323000 audit: BPF prog-id=164 op=LOAD May 13 00:15:52.323000 audit[4079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4068 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866663465323561366166346134313363383664646435373839316230 May 13 00:15:52.323000 audit: BPF prog-id=164 op=UNLOAD May 13 00:15:52.324000 audit: BPF prog-id=163 op=UNLOAD May 13 00:15:52.324000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.324000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.324000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.324000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.324000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.324000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.324000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.324000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.324000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.324000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.324000 audit: BPF prog-id=165 op=LOAD May 13 00:15:52.324000 audit[4079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4068 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866663465323561366166346134313363383664646435373839316230 May 13 00:15:52.325186 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:15:52.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.338000 audit: BPF prog-id=166 op=LOAD May 13 00:15:52.339000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.339000 audit[4050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3563 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134616266396132663865633164663034366264346631323834303038 May 13 00:15:52.339000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.339000 audit[4050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3563 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134616266396132663865633164663034366264346631323834303038 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit: BPF prog-id=167 op=LOAD May 13 00:15:52.340000 audit[4050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3563 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134616266396132663865633164663034366264346631323834303038 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.340000 audit: BPF prog-id=168 op=LOAD May 13 00:15:52.340000 audit[4050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3563 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134616266396132663865633164663034366264346631323834303038 May 13 00:15:52.341000 audit: BPF prog-id=168 op=UNLOAD May 13 00:15:52.341000 audit: BPF prog-id=167 op=UNLOAD May 13 00:15:52.341000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.341000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.341000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.341000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.341000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.341000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.341000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.341000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.341000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.341000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.341000 audit: BPF prog-id=169 op=LOAD May 13 00:15:52.341000 audit[4050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3563 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134616266396132663865633164663034366264346631323834303038 May 13 00:15:52.355134 env[1212]: time="2025-05-13T00:15:52.355010079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-dn47n,Uid:6ea7591f-a126-4b28-aaed-48b0d2ffd7ad,Namespace:kube-system,Attempt:1,} returns sandbox id \"8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b\"" May 13 00:15:52.356135 kubelet[1951]: E0513 00:15:52.356108 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:52.358891 env[1212]: time="2025-05-13T00:15:52.358844611Z" level=info msg="CreateContainer within sandbox \"8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:15:52.377338 systemd-networkd[1052]: calic88b30ff79a: Gained IPv6LL May 13 00:15:52.383330 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1673891648.mount: Deactivated successfully. May 13 00:15:52.392874 env[1212]: time="2025-05-13T00:15:52.392821698Z" level=info msg="StartContainer for \"14abf9a2f8ec1df046bd4f12840088339f5b9efea3af8b58dd8341445b72ecde\" returns successfully" May 13 00:15:52.393247 env[1212]: time="2025-05-13T00:15:52.393055088Z" level=info msg="CreateContainer within sandbox \"8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d47116e9f1b3a374e8c23a12e1d1b27349ab23214fc76d515928b333b51055f1\"" May 13 00:15:52.395420 env[1212]: time="2025-05-13T00:15:52.395348223Z" level=info msg="StartContainer for \"d47116e9f1b3a374e8c23a12e1d1b27349ab23214fc76d515928b333b51055f1\"" May 13 00:15:52.413649 systemd[1]: Started cri-containerd-d47116e9f1b3a374e8c23a12e1d1b27349ab23214fc76d515928b333b51055f1.scope. May 13 00:15:52.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.482000 audit: BPF prog-id=170 op=LOAD May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4068 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434373131366539663162336133373465386332336131326531643162 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4068 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434373131366539663162336133373465386332336131326531643162 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit: BPF prog-id=171 op=LOAD May 13 00:15:52.483000 audit[4130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4068 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434373131366539663162336133373465386332336131326531643162 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit: BPF prog-id=172 op=LOAD May 13 00:15:52.483000 audit[4130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4068 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434373131366539663162336133373465386332336131326531643162 May 13 00:15:52.483000 audit: BPF prog-id=172 op=UNLOAD May 13 00:15:52.483000 audit: BPF prog-id=171 op=UNLOAD May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:52.483000 audit: BPF prog-id=173 op=LOAD May 13 00:15:52.483000 audit[4130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4068 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434373131366539663162336133373465386332336131326531643162 May 13 00:15:52.518006 env[1212]: time="2025-05-13T00:15:52.517944459Z" level=info msg="StartContainer for \"d47116e9f1b3a374e8c23a12e1d1b27349ab23214fc76d515928b333b51055f1\" returns successfully" May 13 00:15:52.824341 systemd-networkd[1052]: cali0f7699b1e6f: Gained IPv6LL May 13 00:15:52.969375 kubelet[1951]: E0513 00:15:52.969344 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:52.998000 audit[4192]: NETFILTER_CFG table=filter:99 family=2 entries=12 op=nft_register_rule pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:52.998000 audit[4192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffed14b230 a2=0 a3=1 items=0 ppid=2094 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:52.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:53.005000 audit[4192]: NETFILTER_CFG table=nat:100 family=2 entries=42 op=nft_register_rule pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:53.005000 audit[4192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffed14b230 a2=0 a3=1 items=0 ppid=2094 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:53.005000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:53.041083 kubelet[1951]: I0513 00:15:53.041012 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-66676fbdf9-qhj5k" podStartSLOduration=23.588582922 podStartE2EDuration="26.040987974s" podCreationTimestamp="2025-05-13 00:15:27 +0000 UTC" firstStartedPulling="2025-05-13 00:15:49.668237626 +0000 UTC m=+33.937481424" lastFinishedPulling="2025-05-13 00:15:52.120642678 +0000 UTC m=+36.389886476" observedRunningTime="2025-05-13 00:15:53.040570161 +0000 UTC m=+37.309813959" watchObservedRunningTime="2025-05-13 00:15:53.040987974 +0000 UTC m=+37.310231772" May 13 00:15:53.041296 kubelet[1951]: I0513 00:15:53.041117 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-dn47n" podStartSLOduration=31.041111909 podStartE2EDuration="31.041111909s" podCreationTimestamp="2025-05-13 00:15:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:15:52.987818366 +0000 UTC m=+37.257062164" watchObservedRunningTime="2025-05-13 00:15:53.041111909 +0000 UTC m=+37.310355707" May 13 00:15:53.053000 audit[4194]: NETFILTER_CFG table=filter:101 family=2 entries=12 op=nft_register_rule pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:53.053000 audit[4194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffffb830b70 a2=0 a3=1 items=0 ppid=2094 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:53.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:53.062000 audit[4194]: NETFILTER_CFG table=nat:102 family=2 entries=18 op=nft_register_rule pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:53.062000 audit[4194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5004 a0=3 a1=fffffb830b70 a2=0 a3=1 items=0 ppid=2094 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:53.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:53.336345 systemd-networkd[1052]: cali88668763942: Gained IPv6LL May 13 00:15:53.830886 env[1212]: time="2025-05-13T00:15:53.829742299Z" level=info msg="StopPodSandbox for \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\"" May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.896 [INFO][4237] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.896 [INFO][4237] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" iface="eth0" netns="/var/run/netns/cni-bdffead0-1a6d-bb1a-6a37-9f5a13be11d7" May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.896 [INFO][4237] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" iface="eth0" netns="/var/run/netns/cni-bdffead0-1a6d-bb1a-6a37-9f5a13be11d7" May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.897 [INFO][4237] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" iface="eth0" netns="/var/run/netns/cni-bdffead0-1a6d-bb1a-6a37-9f5a13be11d7" May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.897 [INFO][4237] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.897 [INFO][4237] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.940 [INFO][4247] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" HandleID="k8s-pod-network.0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.940 [INFO][4247] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.940 [INFO][4247] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.949 [WARNING][4247] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" HandleID="k8s-pod-network.0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.949 [INFO][4247] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" HandleID="k8s-pod-network.0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.951 [INFO][4247] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:53.956639 env[1212]: 2025-05-13 00:15:53.953 [INFO][4237] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:15:53.958889 systemd[1]: run-netns-cni\x2dbdffead0\x2d1a6d\x2dbb1a\x2d6a37\x2d9f5a13be11d7.mount: Deactivated successfully. May 13 00:15:53.959771 env[1212]: time="2025-05-13T00:15:53.959657680Z" level=info msg="TearDown network for sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\" successfully" May 13 00:15:53.959771 env[1212]: time="2025-05-13T00:15:53.959708487Z" level=info msg="StopPodSandbox for \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\" returns successfully" May 13 00:15:53.962482 env[1212]: time="2025-05-13T00:15:53.962421465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wg7hs,Uid:44e13a95-a792-40e7-82f9-58a1c59c3031,Namespace:calico-system,Attempt:1,}" May 13 00:15:53.979222 kubelet[1951]: I0513 00:15:53.979180 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:15:53.979597 kubelet[1951]: E0513 00:15:53.979506 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:54.000727 env[1212]: time="2025-05-13T00:15:54.000680522Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:54.011560 env[1212]: time="2025-05-13T00:15:54.011514520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:54.013079 env[1212]: time="2025-05-13T00:15:54.013050986Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:54.015084 env[1212]: time="2025-05-13T00:15:54.015054750Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:54.015795 env[1212]: time="2025-05-13T00:15:54.015436316Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 13 00:15:54.017656 env[1212]: time="2025-05-13T00:15:54.017626342Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:15:54.038695 env[1212]: time="2025-05-13T00:15:54.038655176Z" level=info msg="CreateContainer within sandbox \"39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 00:15:54.060062 env[1212]: time="2025-05-13T00:15:54.059995767Z" level=info msg="CreateContainer within sandbox \"39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"55656bf2d268ef8ee020ace9264e9ced8bea1b197e4952e51162aa9178c172b1\"" May 13 00:15:54.060871 env[1212]: time="2025-05-13T00:15:54.060840670Z" level=info msg="StartContainer for \"55656bf2d268ef8ee020ace9264e9ced8bea1b197e4952e51162aa9178c172b1\"" May 13 00:15:54.064000 audit[4078]: AVC avc: denied { watch } for pid=4078 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_15_36.516453223/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c805,c838 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c805,c838 tclass=file permissive=0 May 13 00:15:54.064000 audit[4078]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000e49500 a2=fc6 a3=0 items=0 ppid=3563 pid=4078 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c805,c838 key=(null) May 13 00:15:54.064000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:15:54.080000 audit[4286]: NETFILTER_CFG table=filter:103 family=2 entries=12 op=nft_register_rule pid=4286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:54.080000 audit[4286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd6e9e640 a2=0 a3=1 items=0 ppid=2094 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:54.092030 systemd[1]: Started cri-containerd-55656bf2d268ef8ee020ace9264e9ced8bea1b197e4952e51162aa9178c172b1.scope. May 13 00:15:54.122000 audit[4286]: NETFILTER_CFG table=nat:104 family=2 entries=54 op=nft_register_chain pid=4286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:54.122000 audit[4286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19092 a0=3 a1=ffffd6e9e640 a2=0 a3=1 items=0 ppid=2094 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.144000 audit: BPF prog-id=174 op=LOAD May 13 00:15:54.144000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.144000 audit[4280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=3865 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363536626632643236386566386565303230616365393236346539 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=3865 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363536626632643236386566386565303230616365393236346539 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit: BPF prog-id=175 op=LOAD May 13 00:15:54.145000 audit[4280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=3865 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363536626632643236386566386565303230616365393236346539 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit: BPF prog-id=176 op=LOAD May 13 00:15:54.145000 audit[4280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=3865 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363536626632643236386566386565303230616365393236346539 May 13 00:15:54.145000 audit: BPF prog-id=176 op=UNLOAD May 13 00:15:54.145000 audit: BPF prog-id=175 op=UNLOAD May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.145000 audit: BPF prog-id=177 op=LOAD May 13 00:15:54.145000 audit[4280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=3865 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363536626632643236386566386565303230616365393236346539 May 13 00:15:54.183622 env[1212]: time="2025-05-13T00:15:54.183570253Z" level=info msg="StartContainer for \"55656bf2d268ef8ee020ace9264e9ced8bea1b197e4952e51162aa9178c172b1\" returns successfully" May 13 00:15:54.212858 systemd-networkd[1052]: cali40ba67a59cd: Link UP May 13 00:15:54.214402 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:15:54.214468 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali40ba67a59cd: link becomes ready May 13 00:15:54.214212 systemd-networkd[1052]: cali40ba67a59cd: Gained carrier May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.063 [INFO][4254] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.078 [INFO][4254] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--wg7hs-eth0 csi-node-driver- calico-system 44e13a95-a792-40e7-82f9-58a1c59c3031 884 0 2025-05-13 00:15:28 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-wg7hs eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali40ba67a59cd [] []}} ContainerID="34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" Namespace="calico-system" Pod="csi-node-driver-wg7hs" WorkloadEndpoint="localhost-k8s-csi--node--driver--wg7hs-" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.078 [INFO][4254] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" Namespace="calico-system" Pod="csi-node-driver-wg7hs" WorkloadEndpoint="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.144 [INFO][4297] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" HandleID="k8s-pod-network.34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.167 [INFO][4297] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" HandleID="k8s-pod-network.34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000279100), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-wg7hs", "timestamp":"2025-05-13 00:15:54.144582279 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.167 [INFO][4297] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.167 [INFO][4297] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.168 [INFO][4297] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.172 [INFO][4297] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" host="localhost" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.177 [INFO][4297] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.185 [INFO][4297] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.187 [INFO][4297] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.192 [INFO][4297] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.192 [INFO][4297] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" host="localhost" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.194 [INFO][4297] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.199 [INFO][4297] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" host="localhost" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.205 [INFO][4297] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" host="localhost" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.205 [INFO][4297] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" host="localhost" May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.205 [INFO][4297] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:15:54.231316 env[1212]: 2025-05-13 00:15:54.205 [INFO][4297] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" HandleID="k8s-pod-network.34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:15:54.232015 env[1212]: 2025-05-13 00:15:54.208 [INFO][4254] cni-plugin/k8s.go 386: Populated endpoint ContainerID="34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" Namespace="calico-system" Pod="csi-node-driver-wg7hs" WorkloadEndpoint="localhost-k8s-csi--node--driver--wg7hs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wg7hs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"44e13a95-a792-40e7-82f9-58a1c59c3031", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-wg7hs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali40ba67a59cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:54.232015 env[1212]: 2025-05-13 00:15:54.208 [INFO][4254] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" Namespace="calico-system" Pod="csi-node-driver-wg7hs" WorkloadEndpoint="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:15:54.232015 env[1212]: 2025-05-13 00:15:54.208 [INFO][4254] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali40ba67a59cd ContainerID="34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" Namespace="calico-system" Pod="csi-node-driver-wg7hs" WorkloadEndpoint="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:15:54.232015 env[1212]: 2025-05-13 00:15:54.214 [INFO][4254] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" Namespace="calico-system" Pod="csi-node-driver-wg7hs" WorkloadEndpoint="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:15:54.232015 env[1212]: 2025-05-13 00:15:54.214 [INFO][4254] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" Namespace="calico-system" Pod="csi-node-driver-wg7hs" WorkloadEndpoint="localhost-k8s-csi--node--driver--wg7hs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wg7hs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"44e13a95-a792-40e7-82f9-58a1c59c3031", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e", Pod:"csi-node-driver-wg7hs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali40ba67a59cd", MAC:"02:b7:96:d8:c3:d3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:15:54.232015 env[1212]: 2025-05-13 00:15:54.228 [INFO][4254] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e" Namespace="calico-system" Pod="csi-node-driver-wg7hs" WorkloadEndpoint="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:15:54.246423 env[1212]: time="2025-05-13T00:15:54.246313192Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:15:54.246423 env[1212]: time="2025-05-13T00:15:54.246367839Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:15:54.246710 env[1212]: time="2025-05-13T00:15:54.246378640Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:15:54.247262 env[1212]: time="2025-05-13T00:15:54.247116690Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e pid=4341 runtime=io.containerd.runc.v2 May 13 00:15:54.250830 env[1212]: time="2025-05-13T00:15:54.250755292Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:54.255619 env[1212]: time="2025-05-13T00:15:54.255581878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:54.257350 env[1212]: time="2025-05-13T00:15:54.257323009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:54.260036 env[1212]: time="2025-05-13T00:15:54.260005295Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:54.260694 env[1212]: time="2025-05-13T00:15:54.260418425Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 13 00:15:54.264959 env[1212]: time="2025-05-13T00:15:54.264742550Z" level=info msg="CreateContainer within sandbox \"0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:15:54.266199 systemd[1]: Started cri-containerd-34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e.scope. May 13 00:15:54.283504 env[1212]: time="2025-05-13T00:15:54.283448342Z" level=info msg="CreateContainer within sandbox \"0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"bfdea28be4bcf568e034c0e1298cfab5c6f6a101207a22a84780c135db93359a\"" May 13 00:15:54.284144 env[1212]: time="2025-05-13T00:15:54.284112302Z" level=info msg="StartContainer for \"bfdea28be4bcf568e034c0e1298cfab5c6f6a101207a22a84780c135db93359a\"" May 13 00:15:54.339328 systemd[1]: Started cri-containerd-bfdea28be4bcf568e034c0e1298cfab5c6f6a101207a22a84780c135db93359a.scope. May 13 00:15:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit: BPF prog-id=178 op=LOAD May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4341 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623438373430333566373662373635306334323835333162353130 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4341 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623438373430333566373662373635306334323835333162353130 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit: BPF prog-id=179 op=LOAD May 13 00:15:54.356000 audit[4351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4341 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623438373430333566373662373635306334323835333162353130 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit: BPF prog-id=180 op=LOAD May 13 00:15:54.356000 audit[4351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4341 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623438373430333566373662373635306334323835333162353130 May 13 00:15:54.356000 audit: BPF prog-id=180 op=UNLOAD May 13 00:15:54.356000 audit: BPF prog-id=179 op=UNLOAD May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.356000 audit: BPF prog-id=181 op=LOAD May 13 00:15:54.356000 audit[4351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4341 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623438373430333566373662373635306334323835333162353130 May 13 00:15:54.362779 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:15:54.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.375000 audit: BPF prog-id=182 op=LOAD May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3911 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646561323862653462636635363865303334633065313239386366 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3911 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646561323862653462636635363865303334633065313239386366 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit: BPF prog-id=183 op=LOAD May 13 00:15:54.377000 audit[4374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3911 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646561323862653462636635363865303334633065313239386366 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit: BPF prog-id=184 op=LOAD May 13 00:15:54.377000 audit[4374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3911 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646561323862653462636635363865303334633065313239386366 May 13 00:15:54.377000 audit: BPF prog-id=184 op=UNLOAD May 13 00:15:54.377000 audit: BPF prog-id=183 op=UNLOAD May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:54.377000 audit: BPF prog-id=185 op=LOAD May 13 00:15:54.377000 audit[4374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3911 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646561323862653462636635363865303334633065313239386366 May 13 00:15:54.381712 env[1212]: time="2025-05-13T00:15:54.381670669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wg7hs,Uid:44e13a95-a792-40e7-82f9-58a1c59c3031,Namespace:calico-system,Attempt:1,} returns sandbox id \"34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e\"" May 13 00:15:54.383967 env[1212]: time="2025-05-13T00:15:54.383929143Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:15:54.447823 env[1212]: time="2025-05-13T00:15:54.447764135Z" level=info msg="StartContainer for \"bfdea28be4bcf568e034c0e1298cfab5c6f6a101207a22a84780c135db93359a\" returns successfully" May 13 00:15:54.845714 kubelet[1951]: I0513 00:15:54.845668 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:15:54.846405 kubelet[1951]: E0513 00:15:54.846075 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:54.881435 kernel: kauditd_printk_skb: 661 callbacks suppressed May 13 00:15:54.881556 kernel: audit: type=1130 audit(1747095354.876:1250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.7:22-10.0.0.1:48802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:54.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.7:22-10.0.0.1:48802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:54.877905 systemd[1]: Started sshd@9-10.0.0.7:22-10.0.0.1:48802.service. May 13 00:15:54.935000 audit[4449]: USER_ACCT pid=4449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:54.936662 sshd[4449]: Accepted publickey for core from 10.0.0.1 port 48802 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:15:54.939244 kernel: audit: type=1101 audit(1747095354.935:1251): pid=4449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:54.938000 audit[4449]: CRED_ACQ pid=4449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:54.940631 sshd[4449]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:15:54.943976 kernel: audit: type=1103 audit(1747095354.938:1252): pid=4449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:54.944056 kernel: audit: type=1006 audit(1747095354.938:1253): pid=4449 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 13 00:15:54.944078 kernel: audit: type=1300 audit(1747095354.938:1253): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcca70300 a2=3 a3=1 items=0 ppid=1 pid=4449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.938000 audit[4449]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcca70300 a2=3 a3=1 items=0 ppid=1 pid=4449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:54.944804 systemd-logind[1198]: New session 10 of user core. May 13 00:15:54.945255 systemd[1]: Started session-10.scope. May 13 00:15:54.946034 kernel: audit: type=1327 audit(1747095354.938:1253): proctitle=737368643A20636F7265205B707269765D May 13 00:15:54.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:15:54.948000 audit[4449]: USER_START pid=4449 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:54.953327 kernel: audit: type=1105 audit(1747095354.948:1254): pid=4449 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:54.955000 audit[4468]: CRED_ACQ pid=4468 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:54.959278 kernel: audit: type=1103 audit(1747095354.955:1255): pid=4468 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:54.988811 kubelet[1951]: E0513 00:15:54.988772 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:54.996933 kubelet[1951]: I0513 00:15:54.996869 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7599cddf5c-qcxfq" podStartSLOduration=24.303810878 podStartE2EDuration="26.996853413s" podCreationTimestamp="2025-05-13 00:15:28 +0000 UTC" firstStartedPulling="2025-05-13 00:15:51.323873601 +0000 UTC m=+35.593117399" lastFinishedPulling="2025-05-13 00:15:54.016916096 +0000 UTC m=+38.286159934" observedRunningTime="2025-05-13 00:15:54.995277862 +0000 UTC m=+39.264521660" watchObservedRunningTime="2025-05-13 00:15:54.996853413 +0000 UTC m=+39.266097211" May 13 00:15:55.007931 kubelet[1951]: I0513 00:15:55.007856 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-66676fbdf9-48jcd" podStartSLOduration=25.144053752 podStartE2EDuration="28.007842446s" podCreationTimestamp="2025-05-13 00:15:27 +0000 UTC" firstStartedPulling="2025-05-13 00:15:51.398059305 +0000 UTC m=+35.667303063" lastFinishedPulling="2025-05-13 00:15:54.261847959 +0000 UTC m=+38.531091757" observedRunningTime="2025-05-13 00:15:55.006826966 +0000 UTC m=+39.276070764" watchObservedRunningTime="2025-05-13 00:15:55.007842446 +0000 UTC m=+39.277086244" May 13 00:15:55.037469 kernel: audit: type=1325 audit(1747095355.031:1256): table=filter:105 family=2 entries=12 op=nft_register_rule pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:55.037612 kernel: audit: type=1300 audit(1747095355.031:1256): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffeb931740 a2=0 a3=1 items=0 ppid=2094 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:55.031000 audit[4497]: NETFILTER_CFG table=filter:105 family=2 entries=12 op=nft_register_rule pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:55.031000 audit[4497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffeb931740 a2=0 a3=1 items=0 ppid=2094 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:55.031000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:55.040000 audit[4497]: NETFILTER_CFG table=nat:106 family=2 entries=18 op=nft_register_rule pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:55.040000 audit[4497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5004 a0=3 a1=ffffeb931740 a2=0 a3=1 items=0 ppid=2094 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:55.040000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:55.169048 sshd[4449]: pam_unix(sshd:session): session closed for user core May 13 00:15:55.169000 audit[4449]: USER_END pid=4449 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.169000 audit[4449]: CRED_DISP pid=4449 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.7:22-10.0.0.1:48814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:55.173053 systemd[1]: Started sshd@10-10.0.0.7:22-10.0.0.1:48814.service. May 13 00:15:55.179655 systemd-logind[1198]: Session 10 logged out. Waiting for processes to exit. May 13 00:15:55.179797 systemd[1]: sshd@9-10.0.0.7:22-10.0.0.1:48802.service: Deactivated successfully. May 13 00:15:55.180537 systemd[1]: session-10.scope: Deactivated successfully. May 13 00:15:55.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.7:22-10.0.0.1:48802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:55.181346 systemd-logind[1198]: Removed session 10. May 13 00:15:55.215000 audit[4513]: USER_ACCT pid=4513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.216829 sshd[4513]: Accepted publickey for core from 10.0.0.1 port 48814 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:15:55.216000 audit[4513]: CRED_ACQ pid=4513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.216000 audit[4513]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdab56f0 a2=3 a3=1 items=0 ppid=1 pid=4513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:55.216000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:15:55.218400 sshd[4513]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:15:55.222149 systemd-logind[1198]: New session 11 of user core. May 13 00:15:55.222615 systemd[1]: Started session-11.scope. May 13 00:15:55.225000 audit[4513]: USER_START pid=4513 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.226000 audit[4516]: CRED_ACQ pid=4516 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.272636 systemd[1]: run-containerd-runc-k8s.io-bfdea28be4bcf568e034c0e1298cfab5c6f6a101207a22a84780c135db93359a-runc.ZUANnN.mount: Deactivated successfully. May 13 00:15:55.407554 sshd[4513]: pam_unix(sshd:session): session closed for user core May 13 00:15:55.411294 systemd[1]: Started sshd@11-10.0.0.7:22-10.0.0.1:48822.service. May 13 00:15:55.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.7:22-10.0.0.1:48822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:55.411000 audit[4513]: USER_END pid=4513 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.411000 audit[4513]: CRED_DISP pid=4513 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.414180 systemd[1]: sshd@10-10.0.0.7:22-10.0.0.1:48814.service: Deactivated successfully. May 13 00:15:55.414903 systemd[1]: session-11.scope: Deactivated successfully. May 13 00:15:55.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.7:22-10.0.0.1:48814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:55.415582 systemd-logind[1198]: Session 11 logged out. Waiting for processes to exit. May 13 00:15:55.417429 systemd-logind[1198]: Removed session 11. May 13 00:15:55.457000 audit[4525]: USER_ACCT pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.459037 sshd[4525]: Accepted publickey for core from 10.0.0.1 port 48822 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:15:55.459000 audit[4525]: CRED_ACQ pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.459000 audit[4525]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8d0b9c0 a2=3 a3=1 items=0 ppid=1 pid=4525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:55.459000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:15:55.460796 sshd[4525]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:15:55.465189 systemd-logind[1198]: New session 12 of user core. May 13 00:15:55.465655 systemd[1]: Started session-12.scope. May 13 00:15:55.468000 audit[4525]: USER_START pid=4525 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.470000 audit[4528]: CRED_ACQ pid=4528 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.512583 systemd-networkd[1052]: cali40ba67a59cd: Gained IPv6LL May 13 00:15:55.645684 sshd[4525]: pam_unix(sshd:session): session closed for user core May 13 00:15:55.647000 audit[4525]: USER_END pid=4525 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.647000 audit[4525]: CRED_DISP pid=4525 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:15:55.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.7:22-10.0.0.1:48822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:15:55.651999 systemd[1]: sshd@11-10.0.0.7:22-10.0.0.1:48822.service: Deactivated successfully. May 13 00:15:55.652737 systemd[1]: session-12.scope: Deactivated successfully. May 13 00:15:55.653265 systemd-logind[1198]: Session 12 logged out. Waiting for processes to exit. May 13 00:15:55.653897 systemd-logind[1198]: Removed session 12. May 13 00:15:55.685667 env[1212]: time="2025-05-13T00:15:55.685585529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:55.687677 env[1212]: time="2025-05-13T00:15:55.687636851Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:55.689919 env[1212]: time="2025-05-13T00:15:55.689877196Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:55.691784 env[1212]: time="2025-05-13T00:15:55.691748818Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:55.692482 env[1212]: time="2025-05-13T00:15:55.692451581Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 13 00:15:55.694903 env[1212]: time="2025-05-13T00:15:55.694861146Z" level=info msg="CreateContainer within sandbox \"34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:15:55.709556 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount423219784.mount: Deactivated successfully. May 13 00:15:55.712162 env[1212]: time="2025-05-13T00:15:55.712110625Z" level=info msg="CreateContainer within sandbox \"34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"34c02120cbdd7471808fe61cb9ef62bf802441d8fde5f694c1201912da39f82e\"" May 13 00:15:55.714071 env[1212]: time="2025-05-13T00:15:55.713996688Z" level=info msg="StartContainer for \"34c02120cbdd7471808fe61cb9ef62bf802441d8fde5f694c1201912da39f82e\"" May 13 00:15:55.739060 systemd[1]: Started cri-containerd-34c02120cbdd7471808fe61cb9ef62bf802441d8fde5f694c1201912da39f82e.scope. May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4341 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:55.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334633032313230636264643734373138303866653631636239656636 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit: BPF prog-id=186 op=LOAD May 13 00:15:55.788000 audit[4549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4341 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:55.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334633032313230636264643734373138303866653631636239656636 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit: BPF prog-id=187 op=LOAD May 13 00:15:55.788000 audit[4549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4341 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:55.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334633032313230636264643734373138303866653631636239656636 May 13 00:15:55.788000 audit: BPF prog-id=187 op=UNLOAD May 13 00:15:55.788000 audit: BPF prog-id=186 op=UNLOAD May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:55.788000 audit: BPF prog-id=188 op=LOAD May 13 00:15:55.788000 audit[4549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4341 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:55.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334633032313230636264643734373138303866653631636239656636 May 13 00:15:55.796000 audit[4385]: AVC avc: denied { watch } for pid=4385 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_15_36.3867837576/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c635 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c219,c635 tclass=file permissive=0 May 13 00:15:55.796000 audit[4385]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000d9ec40 a2=fc6 a3=0 items=0 ppid=3911 pid=4385 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c635 key=(null) May 13 00:15:55.796000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:15:55.813144 env[1212]: time="2025-05-13T00:15:55.813067160Z" level=info msg="StartContainer for \"34c02120cbdd7471808fe61cb9ef62bf802441d8fde5f694c1201912da39f82e\" returns successfully" May 13 00:15:55.816450 env[1212]: time="2025-05-13T00:15:55.816413075Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:15:55.995281 kubelet[1951]: I0513 00:15:55.994187 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:15:57.412629 env[1212]: time="2025-05-13T00:15:57.412580280Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:57.415466 env[1212]: time="2025-05-13T00:15:57.415417759Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:57.417027 env[1212]: time="2025-05-13T00:15:57.416989176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:57.418364 env[1212]: time="2025-05-13T00:15:57.418329566Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:15:57.419023 env[1212]: time="2025-05-13T00:15:57.418992081Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 13 00:15:57.421707 env[1212]: time="2025-05-13T00:15:57.421578851Z" level=info msg="CreateContainer within sandbox \"34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:15:57.440534 env[1212]: time="2025-05-13T00:15:57.440481096Z" level=info msg="CreateContainer within sandbox \"34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ca431f380fb923d7204a143543e241da894707d327af90d77f334dd860d715cc\"" May 13 00:15:57.442296 env[1212]: time="2025-05-13T00:15:57.441397199Z" level=info msg="StartContainer for \"ca431f380fb923d7204a143543e241da894707d327af90d77f334dd860d715cc\"" May 13 00:15:57.462153 systemd[1]: Started cri-containerd-ca431f380fb923d7204a143543e241da894707d327af90d77f334dd860d715cc.scope. May 13 00:15:57.495000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.495000 audit[4634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4341 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:57.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343331663338306662393233643732303461313433353433653234 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit: BPF prog-id=189 op=LOAD May 13 00:15:57.496000 audit[4634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4341 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:57.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343331663338306662393233643732303461313433353433653234 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.496000 audit: BPF prog-id=190 op=LOAD May 13 00:15:57.496000 audit[4634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4341 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:57.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343331663338306662393233643732303461313433353433653234 May 13 00:15:57.497000 audit: BPF prog-id=190 op=UNLOAD May 13 00:15:57.497000 audit: BPF prog-id=189 op=UNLOAD May 13 00:15:57.497000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.497000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.497000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.497000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.497000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.497000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.497000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.497000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.497000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.497000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:57.497000 audit: BPF prog-id=191 op=LOAD May 13 00:15:57.497000 audit[4634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4341 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:57.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343331663338306662393233643732303461313433353433653234 May 13 00:15:57.513831 env[1212]: time="2025-05-13T00:15:57.513787494Z" level=info msg="StartContainer for \"ca431f380fb923d7204a143543e241da894707d327af90d77f334dd860d715cc\" returns successfully" May 13 00:15:57.558513 kubelet[1951]: I0513 00:15:57.557763 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:15:57.558513 kubelet[1951]: E0513 00:15:57.558122 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:57.592000 audit[4667]: NETFILTER_CFG table=filter:107 family=2 entries=11 op=nft_register_rule pid=4667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:57.592000 audit[4667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffd32786f0 a2=0 a3=1 items=0 ppid=2094 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:57.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:57.604000 audit[4667]: NETFILTER_CFG table=nat:108 family=2 entries=25 op=nft_register_chain pid=4667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:15:57.604000 audit[4667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8580 a0=3 a1=ffffd32786f0 a2=0 a3=1 items=0 ppid=2094 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:57.604000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:15:57.903748 kubelet[1951]: I0513 00:15:57.903705 1951 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:15:57.903983 kubelet[1951]: I0513 00:15:57.903971 1951 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:15:58.001099 kubelet[1951]: E0513 00:15:58.001062 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:15:58.012465 kubelet[1951]: I0513 00:15:58.012403 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-wg7hs" podStartSLOduration=26.975955284 podStartE2EDuration="30.012384258s" podCreationTimestamp="2025-05-13 00:15:28 +0000 UTC" firstStartedPulling="2025-05-13 00:15:54.383647709 +0000 UTC m=+38.652891507" lastFinishedPulling="2025-05-13 00:15:57.420076723 +0000 UTC m=+41.689320481" observedRunningTime="2025-05-13 00:15:58.012028059 +0000 UTC m=+42.281271857" watchObservedRunningTime="2025-05-13 00:15:58.012384258 +0000 UTC m=+42.281628056" May 13 00:15:58.654000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.654000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.654000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.654000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.654000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.654000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.654000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.654000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.654000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.654000 audit: BPF prog-id=192 op=LOAD May 13 00:15:58.654000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd5b58ac8 a2=98 a3=ffffd5b58ab8 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.654000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.655000 audit: BPF prog-id=192 op=UNLOAD May 13 00:15:58.655000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit: BPF prog-id=193 op=LOAD May 13 00:15:58.655000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd5b58758 a2=74 a3=95 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.655000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.655000 audit: BPF prog-id=193 op=UNLOAD May 13 00:15:58.655000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.655000 audit: BPF prog-id=194 op=LOAD May 13 00:15:58.655000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd5b587b8 a2=94 a3=2 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.655000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.656000 audit: BPF prog-id=194 op=UNLOAD May 13 00:15:58.742000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.742000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.742000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.742000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.742000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.742000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.742000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.742000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.742000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.742000 audit: BPF prog-id=195 op=LOAD May 13 00:15:58.742000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd5b58778 a2=40 a3=ffffd5b587a8 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.742000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.742000 audit: BPF prog-id=195 op=UNLOAD May 13 00:15:58.742000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.742000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd5b58890 a2=50 a3=0 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.742000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.751000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.751000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b587e8 a2=28 a3=ffffd5b58918 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.751000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.751000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.751000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd5b58818 a2=28 a3=ffffd5b58948 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.751000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.752000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.752000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd5b586c8 a2=28 a3=ffffd5b587f8 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.752000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.752000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b58838 a2=28 a3=ffffd5b58968 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.752000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.752000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b58818 a2=28 a3=ffffd5b58948 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.752000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.752000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b58808 a2=28 a3=ffffd5b58938 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.752000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.752000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b58838 a2=28 a3=ffffd5b58968 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.752000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.752000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd5b58818 a2=28 a3=ffffd5b58948 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.752000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.752000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd5b58838 a2=28 a3=ffffd5b58968 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.753000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd5b58808 a2=28 a3=ffffd5b58938 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.753000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b58888 a2=28 a3=ffffd5b589c8 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.753000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd5b585c0 a2=50 a3=0 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.753000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.753000 audit: BPF prog-id=196 op=LOAD May 13 00:15:58.753000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd5b585c8 a2=94 a3=5 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.754000 audit: BPF prog-id=196 op=UNLOAD May 13 00:15:58.754000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd5b586d0 a2=50 a3=0 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.754000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.754000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd5b58818 a2=4 a3=3 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.754000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.754000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.754000 audit[4729]: AVC avc: denied { confidentiality } for pid=4729 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:15:58.754000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd5b587f8 a2=94 a3=6 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.754000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.755000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.755000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.755000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.755000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.755000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.755000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.755000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.755000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.755000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.755000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.755000 audit[4729]: AVC avc: denied { confidentiality } for pid=4729 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:15:58.755000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd5b57fc8 a2=94 a3=83 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.756000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.756000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.756000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.756000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.756000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.756000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.756000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.756000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.756000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.756000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.756000 audit[4729]: AVC avc: denied { confidentiality } for pid=4729 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:15:58.756000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd5b57fc8 a2=94 a3=83 items=0 ppid=4712 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.756000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:15:58.766000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.766000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.766000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.766000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.766000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.766000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.766000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.766000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.766000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.766000 audit: BPF prog-id=197 op=LOAD May 13 00:15:58.766000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde0fd7f8 a2=98 a3=ffffde0fd7e8 items=0 ppid=4712 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.766000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:15:58.767000 audit: BPF prog-id=197 op=UNLOAD May 13 00:15:58.767000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit: BPF prog-id=198 op=LOAD May 13 00:15:58.767000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde0fd6a8 a2=74 a3=95 items=0 ppid=4712 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.767000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:15:58.767000 audit: BPF prog-id=198 op=UNLOAD May 13 00:15:58.767000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.767000 audit: BPF prog-id=199 op=LOAD May 13 00:15:58.767000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde0fd6d8 a2=40 a3=ffffde0fd708 items=0 ppid=4712 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.767000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:15:58.767000 audit: BPF prog-id=199 op=UNLOAD May 13 00:15:58.828990 systemd-networkd[1052]: vxlan.calico: Link UP May 13 00:15:58.829008 systemd-networkd[1052]: vxlan.calico: Gained carrier May 13 00:15:58.851000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit: BPF prog-id=200 op=LOAD May 13 00:15:58.851000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffec32f28 a2=98 a3=fffffec32f18 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.851000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.851000 audit: BPF prog-id=200 op=UNLOAD May 13 00:15:58.851000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.851000 audit: BPF prog-id=201 op=LOAD May 13 00:15:58.851000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffec32c08 a2=74 a3=95 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.851000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit: BPF prog-id=201 op=UNLOAD May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit: BPF prog-id=202 op=LOAD May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffec32c68 a2=94 a3=2 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit: BPF prog-id=202 op=UNLOAD May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffec32c98 a2=28 a3=fffffec32dc8 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffec32cc8 a2=28 a3=fffffec32df8 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffec32b78 a2=28 a3=fffffec32ca8 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffec32ce8 a2=28 a3=fffffec32e18 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffec32cc8 a2=28 a3=fffffec32df8 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffec32cb8 a2=28 a3=fffffec32de8 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffec32ce8 a2=28 a3=fffffec32e18 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffec32cc8 a2=28 a3=fffffec32df8 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffec32ce8 a2=28 a3=fffffec32e18 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffec32cb8 a2=28 a3=fffffec32de8 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffec32d38 a2=28 a3=fffffec32e78 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit: BPF prog-id=203 op=LOAD May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffec32b58 a2=40 a3=fffffec32b88 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit: BPF prog-id=203 op=UNLOAD May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffffec32b80 a2=50 a3=0 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=fffffec32b80 a2=50 a3=0 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit: BPF prog-id=204 op=LOAD May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffec322e8 a2=94 a3=2 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.852000 audit: BPF prog-id=204 op=UNLOAD May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { perfmon } for pid=4761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit[4761]: AVC avc: denied { bpf } for pid=4761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.852000 audit: BPF prog-id=205 op=LOAD May 13 00:15:58.852000 audit[4761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffec32478 a2=94 a3=30 items=0 ppid=4712 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit: BPF prog-id=206 op=LOAD May 13 00:15:58.860000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc12727d8 a2=98 a3=ffffc12727c8 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.860000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.860000 audit: BPF prog-id=206 op=UNLOAD May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit: BPF prog-id=207 op=LOAD May 13 00:15:58.860000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc1272468 a2=74 a3=95 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.860000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.860000 audit: BPF prog-id=207 op=UNLOAD May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.860000 audit: BPF prog-id=208 op=LOAD May 13 00:15:58.860000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc12724c8 a2=94 a3=2 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.860000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.860000 audit: BPF prog-id=208 op=UNLOAD May 13 00:15:58.948000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.948000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.948000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.948000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.948000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.948000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.948000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.948000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.948000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.948000 audit: BPF prog-id=209 op=LOAD May 13 00:15:58.948000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc1272488 a2=40 a3=ffffc12724b8 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.948000 audit: BPF prog-id=209 op=UNLOAD May 13 00:15:58.948000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.948000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc12725a0 a2=50 a3=0 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc12724f8 a2=28 a3=ffffc1272628 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc1272528 a2=28 a3=ffffc1272658 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc12723d8 a2=28 a3=ffffc1272508 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc1272548 a2=28 a3=ffffc1272678 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc1272528 a2=28 a3=ffffc1272658 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc1272518 a2=28 a3=ffffc1272648 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc1272548 a2=28 a3=ffffc1272678 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc1272528 a2=28 a3=ffffc1272658 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc1272548 a2=28 a3=ffffc1272678 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc1272518 a2=28 a3=ffffc1272648 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc1272598 a2=28 a3=ffffc12726d8 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc12722d0 a2=50 a3=0 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit: BPF prog-id=210 op=LOAD May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc12722d8 a2=94 a3=5 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit: BPF prog-id=210 op=UNLOAD May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc12723e0 a2=50 a3=0 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc1272528 a2=4 a3=3 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.963000 audit[4769]: AVC avc: denied { confidentiality } for pid=4769 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:15:58.963000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc1272508 a2=94 a3=6 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { confidentiality } for pid=4769 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:15:58.964000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc1271cd8 a2=94 a3=83 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { confidentiality } for pid=4769 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:15:58.964000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc1271cd8 a2=94 a3=83 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc1273718 a2=10 a3=ffffc1273808 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc12735d8 a2=10 a3=ffffc12736c8 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc1273548 a2=10 a3=ffffc12736c8 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.964000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:15:58.964000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc1273548 a2=10 a3=ffffc12736c8 items=0 ppid=4712 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:58.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:15:58.972000 audit: BPF prog-id=205 op=UNLOAD May 13 00:15:59.046000 audit[4798]: NETFILTER_CFG table=mangle:109 family=2 entries=16 op=nft_register_chain pid=4798 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:15:59.046000 audit[4798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc27c1290 a2=0 a3=ffff97dedfa8 items=0 ppid=4712 pid=4798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:59.046000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:15:59.055000 audit[4797]: NETFILTER_CFG table=nat:110 family=2 entries=15 op=nft_register_chain pid=4797 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:15:59.055000 audit[4797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc8779d30 a2=0 a3=ffff8ad70fa8 items=0 ppid=4712 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:59.055000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:15:59.058000 audit[4802]: NETFILTER_CFG table=filter:111 family=2 entries=209 op=nft_register_chain pid=4802 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:15:59.058000 audit[4802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=122920 a0=3 a1=fffffe0294f0 a2=0 a3=ffff8831dfa8 items=0 ppid=4712 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:59.058000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:15:59.066000 audit[4796]: NETFILTER_CFG table=raw:112 family=2 entries=21 op=nft_register_chain pid=4796 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:15:59.066000 audit[4796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffd428af30 a2=0 a3=ffff82385fa8 items=0 ppid=4712 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:15:59.066000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:16:00.376423 systemd-networkd[1052]: vxlan.calico: Gained IPv6LL May 13 00:16:00.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.7:22-10.0.0.1:48828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:00.650863 systemd[1]: Started sshd@12-10.0.0.7:22-10.0.0.1:48828.service. May 13 00:16:00.651626 kernel: kauditd_printk_skb: 604 callbacks suppressed May 13 00:16:00.651660 kernel: audit: type=1130 audit(1747095360.650:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.7:22-10.0.0.1:48828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:00.707000 audit[4814]: USER_ACCT pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.708402 sshd[4814]: Accepted publickey for core from 10.0.0.1 port 48828 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:00.710136 sshd[4814]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:00.709000 audit[4814]: CRED_ACQ pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.713434 kernel: audit: type=1101 audit(1747095360.707:1390): pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.713494 kernel: audit: type=1103 audit(1747095360.709:1391): pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.715346 kernel: audit: type=1006 audit(1747095360.709:1392): pid=4814 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 13 00:16:00.715405 kernel: audit: type=1300 audit(1747095360.709:1392): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcf88020 a2=3 a3=1 items=0 ppid=1 pid=4814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:00.709000 audit[4814]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcf88020 a2=3 a3=1 items=0 ppid=1 pid=4814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:00.717094 systemd-logind[1198]: New session 13 of user core. May 13 00:16:00.717742 kernel: audit: type=1327 audit(1747095360.709:1392): proctitle=737368643A20636F7265205B707269765D May 13 00:16:00.709000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:00.718016 systemd[1]: Started session-13.scope. May 13 00:16:00.722000 audit[4814]: USER_START pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.723000 audit[4816]: CRED_ACQ pid=4816 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.727361 kernel: audit: type=1105 audit(1747095360.722:1393): pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.727464 kernel: audit: type=1103 audit(1747095360.723:1394): pid=4816 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.889407 sshd[4814]: pam_unix(sshd:session): session closed for user core May 13 00:16:00.891000 audit[4814]: USER_END pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.893565 systemd[1]: sshd@12-10.0.0.7:22-10.0.0.1:48828.service: Deactivated successfully. May 13 00:16:00.891000 audit[4814]: CRED_DISP pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.894507 systemd[1]: session-13.scope: Deactivated successfully. May 13 00:16:00.896334 kernel: audit: type=1106 audit(1747095360.891:1395): pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.896434 kernel: audit: type=1104 audit(1747095360.891:1396): pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:00.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.7:22-10.0.0.1:48828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:00.897931 systemd-logind[1198]: Session 13 logged out. Waiting for processes to exit. May 13 00:16:00.898776 systemd-logind[1198]: Removed session 13. May 13 00:16:05.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.7:22-10.0.0.1:42900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:05.894471 systemd[1]: Started sshd@13-10.0.0.7:22-10.0.0.1:42900.service. May 13 00:16:05.897101 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:16:05.897180 kernel: audit: type=1130 audit(1747095365.893:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.7:22-10.0.0.1:42900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:05.941000 audit[4835]: USER_ACCT pid=4835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:05.942631 sshd[4835]: Accepted publickey for core from 10.0.0.1 port 42900 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:05.943810 sshd[4835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:05.942000 audit[4835]: CRED_ACQ pid=4835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:05.947039 kernel: audit: type=1101 audit(1747095365.941:1399): pid=4835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:05.947122 kernel: audit: type=1103 audit(1747095365.942:1400): pid=4835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:05.947147 kernel: audit: type=1006 audit(1747095365.942:1401): pid=4835 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 13 00:16:05.948403 kernel: audit: type=1300 audit(1747095365.942:1401): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0762a90 a2=3 a3=1 items=0 ppid=1 pid=4835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:05.942000 audit[4835]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0762a90 a2=3 a3=1 items=0 ppid=1 pid=4835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:05.949589 systemd-logind[1198]: New session 14 of user core. May 13 00:16:05.950395 systemd[1]: Started session-14.scope. May 13 00:16:05.942000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:05.951565 kernel: audit: type=1327 audit(1747095365.942:1401): proctitle=737368643A20636F7265205B707269765D May 13 00:16:05.952000 audit[4835]: USER_START pid=4835 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:05.953000 audit[4837]: CRED_ACQ pid=4837 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:05.958375 kernel: audit: type=1105 audit(1747095365.952:1402): pid=4835 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:05.958439 kernel: audit: type=1103 audit(1747095365.953:1403): pid=4837 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:06.098882 sshd[4835]: pam_unix(sshd:session): session closed for user core May 13 00:16:06.098000 audit[4835]: USER_END pid=4835 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:06.101824 systemd[1]: session-14.scope: Deactivated successfully. May 13 00:16:06.098000 audit[4835]: CRED_DISP pid=4835 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:06.102492 systemd-logind[1198]: Session 14 logged out. Waiting for processes to exit. May 13 00:16:06.103116 systemd[1]: sshd@13-10.0.0.7:22-10.0.0.1:42900.service: Deactivated successfully. May 13 00:16:06.104126 systemd-logind[1198]: Removed session 14. May 13 00:16:06.104624 kernel: audit: type=1106 audit(1747095366.098:1404): pid=4835 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:06.104688 kernel: audit: type=1104 audit(1747095366.098:1405): pid=4835 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:06.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.7:22-10.0.0.1:42900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:11.108981 systemd[1]: Started sshd@14-10.0.0.7:22-10.0.0.1:42912.service. May 13 00:16:11.114463 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:16:11.114643 kernel: audit: type=1130 audit(1747095371.109:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.7:22-10.0.0.1:42912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:11.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.7:22-10.0.0.1:42912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:11.154000 audit[4858]: USER_ACCT pid=4858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.155246 sshd[4858]: Accepted publickey for core from 10.0.0.1 port 42912 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:11.156385 sshd[4858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:11.155000 audit[4858]: CRED_ACQ pid=4858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.159599 kernel: audit: type=1101 audit(1747095371.154:1408): pid=4858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.159661 kernel: audit: type=1103 audit(1747095371.155:1409): pid=4858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.159736 kernel: audit: type=1006 audit(1747095371.155:1410): pid=4858 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 13 00:16:11.164657 kernel: audit: type=1300 audit(1747095371.155:1410): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdf246b0 a2=3 a3=1 items=0 ppid=1 pid=4858 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:11.164741 kernel: audit: type=1327 audit(1747095371.155:1410): proctitle=737368643A20636F7265205B707269765D May 13 00:16:11.155000 audit[4858]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdf246b0 a2=3 a3=1 items=0 ppid=1 pid=4858 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:11.155000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:11.161728 systemd[1]: Started session-15.scope. May 13 00:16:11.161871 systemd-logind[1198]: New session 15 of user core. May 13 00:16:11.165000 audit[4858]: USER_START pid=4858 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.167000 audit[4860]: CRED_ACQ pid=4860 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.172462 kernel: audit: type=1105 audit(1747095371.165:1411): pid=4858 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.172529 kernel: audit: type=1103 audit(1747095371.167:1412): pid=4860 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.292608 sshd[4858]: pam_unix(sshd:session): session closed for user core May 13 00:16:11.293000 audit[4858]: USER_END pid=4858 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.298819 kernel: audit: type=1106 audit(1747095371.293:1413): pid=4858 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.298894 kernel: audit: type=1104 audit(1747095371.293:1414): pid=4858 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.293000 audit[4858]: CRED_DISP pid=4858 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:11.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.7:22-10.0.0.1:42912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:11.295921 systemd[1]: sshd@14-10.0.0.7:22-10.0.0.1:42912.service: Deactivated successfully. May 13 00:16:11.296753 systemd[1]: session-15.scope: Deactivated successfully. May 13 00:16:11.297240 systemd-logind[1198]: Session 15 logged out. Waiting for processes to exit. May 13 00:16:11.298025 systemd-logind[1198]: Removed session 15. May 13 00:16:12.585120 kubelet[1951]: I0513 00:16:12.585077 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:16:12.623000 audit[4871]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:12.623000 audit[4871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe503e810 a2=0 a3=1 items=0 ppid=2094 pid=4871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:12.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:12.633000 audit[4871]: NETFILTER_CFG table=nat:114 family=2 entries=27 op=nft_register_chain pid=4871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:12.633000 audit[4871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffe503e810 a2=0 a3=1 items=0 ppid=2094 pid=4871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:12.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:12.659077 systemd[1]: run-containerd-runc-k8s.io-55656bf2d268ef8ee020ace9264e9ced8bea1b197e4952e51162aa9178c172b1-runc.An4XaM.mount: Deactivated successfully. May 13 00:16:13.132000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:13.132000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002119ba0 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:16:13.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:16:13.132000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:13.132000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013a0240 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:16:13.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:16:13.360000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:13.360000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=4007db3dd0 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:16:13.360000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:16:13.360000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:13.360000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7c a1=400c7d9c80 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:16:13.360000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:16:13.367000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:13.367000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=400d71ec00 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:16:13.367000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:16:13.367000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:13.367000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=400f6684a0 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:16:13.367000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:16:13.410000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:13.410000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=400db5e030 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:16:13.410000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:16:13.410000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:13.410000 audit[1822]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7c a1=400bde5fc0 a2=fc6 a3=0 items=0 ppid=1660 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c561,c711 key=(null) May 13 00:16:13.410000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 13 00:16:13.723139 kubelet[1951]: I0513 00:16:13.723023 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:16:13.756000 audit[4894]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:13.756000 audit[4894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe4fd40a0 a2=0 a3=1 items=0 ppid=2094 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:13.756000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:13.773000 audit[4894]: NETFILTER_CFG table=nat:116 family=2 entries=34 op=nft_register_chain pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:13.773000 audit[4894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffe4fd40a0 a2=0 a3=1 items=0 ppid=2094 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:13.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:15.817418 env[1212]: time="2025-05-13T00:16:15.817362732Z" level=info msg="StopPodSandbox for \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\"" May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.857 [WARNING][4927] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--dn47n-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6ea7591f-a126-4b28-aaed-48b0d2ffd7ad", ResourceVersion:"875", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b", Pod:"coredns-6f6b679f8f-dn47n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali88668763942", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.857 [INFO][4927] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.857 [INFO][4927] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" iface="eth0" netns="" May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.858 [INFO][4927] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.858 [INFO][4927] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.881 [INFO][4942] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" HandleID="k8s-pod-network.6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.881 [INFO][4942] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.881 [INFO][4942] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.889 [WARNING][4942] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" HandleID="k8s-pod-network.6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.889 [INFO][4942] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" HandleID="k8s-pod-network.6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.890 [INFO][4942] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:15.894203 env[1212]: 2025-05-13 00:16:15.892 [INFO][4927] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:16:15.894667 env[1212]: time="2025-05-13T00:16:15.894244774Z" level=info msg="TearDown network for sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\" successfully" May 13 00:16:15.894667 env[1212]: time="2025-05-13T00:16:15.894278217Z" level=info msg="StopPodSandbox for \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\" returns successfully" May 13 00:16:15.894843 env[1212]: time="2025-05-13T00:16:15.894798501Z" level=info msg="RemovePodSandbox for \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\"" May 13 00:16:15.894877 env[1212]: time="2025-05-13T00:16:15.894838104Z" level=info msg="Forcibly stopping sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\"" May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.932 [WARNING][4965] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--dn47n-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6ea7591f-a126-4b28-aaed-48b0d2ffd7ad", ResourceVersion:"875", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8ff4e25a6af4a413c86ddd57891b0a87781e275c8e7b79c54998a1043c5e236b", Pod:"coredns-6f6b679f8f-dn47n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali88668763942", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.932 [INFO][4965] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.932 [INFO][4965] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" iface="eth0" netns="" May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.932 [INFO][4965] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.932 [INFO][4965] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.954 [INFO][4973] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" HandleID="k8s-pod-network.6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.954 [INFO][4973] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.954 [INFO][4973] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.966 [WARNING][4973] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" HandleID="k8s-pod-network.6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.966 [INFO][4973] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" HandleID="k8s-pod-network.6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" Workload="localhost-k8s-coredns--6f6b679f8f--dn47n-eth0" May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.967 [INFO][4973] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:15.971430 env[1212]: 2025-05-13 00:16:15.969 [INFO][4965] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927" May 13 00:16:15.972043 env[1212]: time="2025-05-13T00:16:15.971458084Z" level=info msg="TearDown network for sandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\" successfully" May 13 00:16:15.979887 env[1212]: time="2025-05-13T00:16:15.979834502Z" level=info msg="RemovePodSandbox \"6103e74d36d478a0b2beb1f3b3ec1d13734d17961012fcd37374eac537c8a927\" returns successfully" May 13 00:16:15.980401 env[1212]: time="2025-05-13T00:16:15.980366946Z" level=info msg="StopPodSandbox for \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\"" May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.016 [WARNING][4996] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wg7hs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"44e13a95-a792-40e7-82f9-58a1c59c3031", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e", Pod:"csi-node-driver-wg7hs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali40ba67a59cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.016 [INFO][4996] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.016 [INFO][4996] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" iface="eth0" netns="" May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.016 [INFO][4996] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.017 [INFO][4996] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.035 [INFO][5004] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" HandleID="k8s-pod-network.0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.035 [INFO][5004] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.036 [INFO][5004] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.045 [WARNING][5004] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" HandleID="k8s-pod-network.0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.045 [INFO][5004] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" HandleID="k8s-pod-network.0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.046 [INFO][5004] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:16.053690 env[1212]: 2025-05-13 00:16:16.051 [INFO][4996] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:16:16.054258 env[1212]: time="2025-05-13T00:16:16.054225012Z" level=info msg="TearDown network for sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\" successfully" May 13 00:16:16.054350 env[1212]: time="2025-05-13T00:16:16.054332581Z" level=info msg="StopPodSandbox for \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\" returns successfully" May 13 00:16:16.054927 env[1212]: time="2025-05-13T00:16:16.054893308Z" level=info msg="RemovePodSandbox for \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\"" May 13 00:16:16.055005 env[1212]: time="2025-05-13T00:16:16.054934351Z" level=info msg="Forcibly stopping sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\"" May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.103 [WARNING][5032] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wg7hs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"44e13a95-a792-40e7-82f9-58a1c59c3031", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"34b4874035f76b7650c428531b510212fa852592e78c0781508f15e6446c2f1e", Pod:"csi-node-driver-wg7hs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali40ba67a59cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.103 [INFO][5032] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.103 [INFO][5032] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" iface="eth0" netns="" May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.103 [INFO][5032] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.103 [INFO][5032] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.126 [INFO][5041] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" HandleID="k8s-pod-network.0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.126 [INFO][5041] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.126 [INFO][5041] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.134 [WARNING][5041] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" HandleID="k8s-pod-network.0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.134 [INFO][5041] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" HandleID="k8s-pod-network.0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" Workload="localhost-k8s-csi--node--driver--wg7hs-eth0" May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.136 [INFO][5041] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:16.140415 env[1212]: 2025-05-13 00:16:16.138 [INFO][5032] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3" May 13 00:16:16.140415 env[1212]: time="2025-05-13T00:16:16.140268546Z" level=info msg="TearDown network for sandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\" successfully" May 13 00:16:16.143530 env[1212]: time="2025-05-13T00:16:16.143404565Z" level=info msg="RemovePodSandbox \"0085e4c5ce4bb9020012de8c9a3b152e84e5d8b40deee283445bb95ce3d99ec3\" returns successfully" May 13 00:16:16.144118 env[1212]: time="2025-05-13T00:16:16.144046218Z" level=info msg="StopPodSandbox for \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\"" May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.184 [WARNING][5064] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0", GenerateName:"calico-apiserver-66676fbdf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"51abde12-be7a-4fec-9e5c-125c65b05aea", ResourceVersion:"1033", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66676fbdf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24", Pod:"calico-apiserver-66676fbdf9-48jcd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0f7699b1e6f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.184 [INFO][5064] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.184 [INFO][5064] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" iface="eth0" netns="" May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.184 [INFO][5064] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.184 [INFO][5064] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.204 [INFO][5072] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" HandleID="k8s-pod-network.5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.204 [INFO][5072] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.204 [INFO][5072] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.212 [WARNING][5072] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" HandleID="k8s-pod-network.5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.212 [INFO][5072] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" HandleID="k8s-pod-network.5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.214 [INFO][5072] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:16.218261 env[1212]: 2025-05-13 00:16:16.216 [INFO][5064] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:16:16.218701 env[1212]: time="2025-05-13T00:16:16.218277658Z" level=info msg="TearDown network for sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\" successfully" May 13 00:16:16.218701 env[1212]: time="2025-05-13T00:16:16.218310940Z" level=info msg="StopPodSandbox for \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\" returns successfully" May 13 00:16:16.219251 env[1212]: time="2025-05-13T00:16:16.219203894Z" level=info msg="RemovePodSandbox for \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\"" May 13 00:16:16.219312 env[1212]: time="2025-05-13T00:16:16.219261419Z" level=info msg="Forcibly stopping sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\"" May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.258 [WARNING][5095] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0", GenerateName:"calico-apiserver-66676fbdf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"51abde12-be7a-4fec-9e5c-125c65b05aea", ResourceVersion:"1033", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66676fbdf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0916c8610c7e7154d8b84081a9252c43a113dd686a9e3084c6eecc70350bdd24", Pod:"calico-apiserver-66676fbdf9-48jcd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0f7699b1e6f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.260 [INFO][5095] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.260 [INFO][5095] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" iface="eth0" netns="" May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.260 [INFO][5095] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.260 [INFO][5095] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.278 [INFO][5104] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" HandleID="k8s-pod-network.5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.279 [INFO][5104] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.279 [INFO][5104] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.288 [WARNING][5104] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" HandleID="k8s-pod-network.5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.288 [INFO][5104] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" HandleID="k8s-pod-network.5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" Workload="localhost-k8s-calico--apiserver--66676fbdf9--48jcd-eth0" May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.289 [INFO][5104] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:16.293956 env[1212]: 2025-05-13 00:16:16.292 [INFO][5095] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7" May 13 00:16:16.294415 env[1212]: time="2025-05-13T00:16:16.293987939Z" level=info msg="TearDown network for sandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\" successfully" May 13 00:16:16.295680 systemd[1]: Started sshd@15-10.0.0.7:22-10.0.0.1:59896.service. May 13 00:16:16.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.7:22-10.0.0.1:59896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:16.296495 kernel: kauditd_printk_skb: 37 callbacks suppressed May 13 00:16:16.296684 kernel: audit: type=1130 audit(1747095376.294:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.7:22-10.0.0.1:59896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:16.297160 env[1212]: time="2025-05-13T00:16:16.297115277Z" level=info msg="RemovePodSandbox \"5133f50f6f2cd05a2d77473701d02bf85ea40996859d5c00058078c0cb7a01d7\" returns successfully" May 13 00:16:16.297639 env[1212]: time="2025-05-13T00:16:16.297609398Z" level=info msg="StopPodSandbox for \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\"" May 13 00:16:16.345000 audit[5112]: USER_ACCT pid=5112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.346819 sshd[5112]: Accepted publickey for core from 10.0.0.1 port 59896 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:16.348423 sshd[5112]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:16.345000 audit[5112]: CRED_ACQ pid=5112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.351572 kernel: audit: type=1101 audit(1747095376.345:1429): pid=5112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.351641 kernel: audit: type=1103 audit(1747095376.345:1430): pid=5112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.351663 kernel: audit: type=1006 audit(1747095376.345:1431): pid=5112 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 13 00:16:16.345000 audit[5112]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3ea3bc0 a2=3 a3=1 items=0 ppid=1 pid=5112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:16.355440 kernel: audit: type=1300 audit(1747095376.345:1431): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3ea3bc0 a2=3 a3=1 items=0 ppid=1 pid=5112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:16.345000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:16.356436 kernel: audit: type=1327 audit(1747095376.345:1431): proctitle=737368643A20636F7265205B707269765D May 13 00:16:16.358045 systemd[1]: Started session-16.scope. May 13 00:16:16.359456 systemd-logind[1198]: New session 16 of user core. May 13 00:16:16.363000 audit[5112]: USER_START pid=5112 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.364000 audit[5143]: CRED_ACQ pid=5143 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.369343 kernel: audit: type=1105 audit(1747095376.363:1432): pid=5112 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.369416 kernel: audit: type=1103 audit(1747095376.364:1433): pid=5143 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.344 [WARNING][5128] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0", GenerateName:"calico-kube-controllers-7599cddf5c-", Namespace:"calico-system", SelfLink:"", UID:"d0fc6189-5541-4d79-b8a2-4b772da81d19", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7599cddf5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec", Pod:"calico-kube-controllers-7599cddf5c-qcxfq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic88b30ff79a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.344 [INFO][5128] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.344 [INFO][5128] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" iface="eth0" netns="" May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.344 [INFO][5128] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.344 [INFO][5128] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.381 [INFO][5137] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" HandleID="k8s-pod-network.41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.381 [INFO][5137] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.381 [INFO][5137] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.392 [WARNING][5137] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" HandleID="k8s-pod-network.41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.392 [INFO][5137] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" HandleID="k8s-pod-network.41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.395 [INFO][5137] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:16.401557 env[1212]: 2025-05-13 00:16:16.397 [INFO][5128] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:16:16.401557 env[1212]: time="2025-05-13T00:16:16.401285425Z" level=info msg="TearDown network for sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\" successfully" May 13 00:16:16.401557 env[1212]: time="2025-05-13T00:16:16.401323348Z" level=info msg="StopPodSandbox for \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\" returns successfully" May 13 00:16:16.402182 env[1212]: time="2025-05-13T00:16:16.402150617Z" level=info msg="RemovePodSandbox for \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\"" May 13 00:16:16.402325 env[1212]: time="2025-05-13T00:16:16.402287188Z" level=info msg="Forcibly stopping sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\"" May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.443 [WARNING][5160] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0", GenerateName:"calico-kube-controllers-7599cddf5c-", Namespace:"calico-system", SelfLink:"", UID:"d0fc6189-5541-4d79-b8a2-4b772da81d19", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7599cddf5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"39ce3954114ee92493315e9865799bce52e6048f612aba154c3f61fe5337b7ec", Pod:"calico-kube-controllers-7599cddf5c-qcxfq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic88b30ff79a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.444 [INFO][5160] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.444 [INFO][5160] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" iface="eth0" netns="" May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.444 [INFO][5160] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.444 [INFO][5160] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.469 [INFO][5176] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" HandleID="k8s-pod-network.41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.469 [INFO][5176] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.469 [INFO][5176] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.480 [WARNING][5176] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" HandleID="k8s-pod-network.41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.480 [INFO][5176] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" HandleID="k8s-pod-network.41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" Workload="localhost-k8s-calico--kube--controllers--7599cddf5c--qcxfq-eth0" May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.481 [INFO][5176] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:16.485552 env[1212]: 2025-05-13 00:16:16.483 [INFO][5160] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a" May 13 00:16:16.485976 env[1212]: time="2025-05-13T00:16:16.485582215Z" level=info msg="TearDown network for sandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\" successfully" May 13 00:16:16.488519 env[1212]: time="2025-05-13T00:16:16.488486134Z" level=info msg="RemovePodSandbox \"41b910d0307e6595515451bd432a3b59e29c3e4268b93133d6bd0dec6ca6c15a\" returns successfully" May 13 00:16:16.488967 env[1212]: time="2025-05-13T00:16:16.488942972Z" level=info msg="StopPodSandbox for \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\"" May 13 00:16:16.527507 sshd[5112]: pam_unix(sshd:session): session closed for user core May 13 00:16:16.531000 audit[5112]: USER_END pid=5112 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.532890 systemd[1]: Started sshd@16-10.0.0.7:22-10.0.0.1:59900.service. May 13 00:16:16.539109 kernel: audit: type=1106 audit(1747095376.531:1434): pid=5112 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.539232 kernel: audit: type=1104 audit(1747095376.531:1435): pid=5112 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.531000 audit[5112]: CRED_DISP pid=5112 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.7:22-10.0.0.1:59900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:16.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.7:22-10.0.0.1:59896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:16.536161 systemd[1]: sshd@15-10.0.0.7:22-10.0.0.1:59896.service: Deactivated successfully. May 13 00:16:16.536912 systemd[1]: session-16.scope: Deactivated successfully. May 13 00:16:16.538401 systemd-logind[1198]: Session 16 logged out. Waiting for processes to exit. May 13 00:16:16.539460 systemd-logind[1198]: Removed session 16. May 13 00:16:16.592000 audit[5209]: USER_ACCT pid=5209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.593960 sshd[5209]: Accepted publickey for core from 10.0.0.1 port 59900 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:16.594000 audit[5209]: CRED_ACQ pid=5209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.594000 audit[5209]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9b4be10 a2=3 a3=1 items=0 ppid=1 pid=5209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:16.594000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:16.596108 sshd[5209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:16.607321 systemd[1]: Started session-17.scope. May 13 00:16:16.607850 systemd-logind[1198]: New session 17 of user core. May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.551 [WARNING][5201] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0", GenerateName:"calico-apiserver-66676fbdf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"f3b54bbc-97b4-4186-b0e1-1275f78689f8", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66676fbdf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f", Pod:"calico-apiserver-66676fbdf9-qhj5k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calide3580597b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.551 [INFO][5201] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.551 [INFO][5201] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" iface="eth0" netns="" May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.551 [INFO][5201] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.551 [INFO][5201] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.587 [INFO][5213] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" HandleID="k8s-pod-network.9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.587 [INFO][5213] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.587 [INFO][5213] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.599 [WARNING][5213] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" HandleID="k8s-pod-network.9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.599 [INFO][5213] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" HandleID="k8s-pod-network.9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.601 [INFO][5213] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:16.612854 env[1212]: 2025-05-13 00:16:16.610 [INFO][5201] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:16:16.613420 env[1212]: time="2025-05-13T00:16:16.613379831Z" level=info msg="TearDown network for sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\" successfully" May 13 00:16:16.613494 env[1212]: time="2025-05-13T00:16:16.613477559Z" level=info msg="StopPodSandbox for \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\" returns successfully" May 13 00:16:16.614061 env[1212]: time="2025-05-13T00:16:16.614020404Z" level=info msg="RemovePodSandbox for \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\"" May 13 00:16:16.614144 env[1212]: time="2025-05-13T00:16:16.614059207Z" level=info msg="Forcibly stopping sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\"" May 13 00:16:16.618000 audit[5209]: USER_START pid=5209 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.620000 audit[5229]: CRED_ACQ pid=5229 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.668 [WARNING][5236] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0", GenerateName:"calico-apiserver-66676fbdf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"f3b54bbc-97b4-4186-b0e1-1275f78689f8", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66676fbdf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5dc4a4b89e9d5f52cb9b66ccd7763c720293f1e1db524f316b49834eac6d560f", Pod:"calico-apiserver-66676fbdf9-qhj5k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calide3580597b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.669 [INFO][5236] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.669 [INFO][5236] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" iface="eth0" netns="" May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.669 [INFO][5236] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.669 [INFO][5236] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.692 [INFO][5245] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" HandleID="k8s-pod-network.9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.692 [INFO][5245] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.692 [INFO][5245] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.701 [WARNING][5245] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" HandleID="k8s-pod-network.9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.701 [INFO][5245] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" HandleID="k8s-pod-network.9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" Workload="localhost-k8s-calico--apiserver--66676fbdf9--qhj5k-eth0" May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.702 [INFO][5245] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:16.710349 env[1212]: 2025-05-13 00:16:16.705 [INFO][5236] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb" May 13 00:16:16.710349 env[1212]: time="2025-05-13T00:16:16.707675325Z" level=info msg="TearDown network for sandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\" successfully" May 13 00:16:16.713083 env[1212]: time="2025-05-13T00:16:16.713042048Z" level=info msg="RemovePodSandbox \"9279344ca10714967eb0e336059b169261f48499750173d6eceed043a38d65eb\" returns successfully" May 13 00:16:16.713713 env[1212]: time="2025-05-13T00:16:16.713682941Z" level=info msg="StopPodSandbox for \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\"" May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.809 [WARNING][5270] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b7eaf24b-58d9-45e5-b364-5ba55a087a71", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3", Pod:"coredns-6f6b679f8f-kh2hc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5edb6773638", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.810 [INFO][5270] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.810 [INFO][5270] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" iface="eth0" netns="" May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.810 [INFO][5270] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.810 [INFO][5270] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.836 [INFO][5279] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" HandleID="k8s-pod-network.3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.836 [INFO][5279] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.836 [INFO][5279] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.857 [WARNING][5279] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" HandleID="k8s-pod-network.3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.857 [INFO][5279] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" HandleID="k8s-pod-network.3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.861 [INFO][5279] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:16.865960 env[1212]: 2025-05-13 00:16:16.863 [INFO][5270] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:16:16.866817 env[1212]: time="2025-05-13T00:16:16.865987817Z" level=info msg="TearDown network for sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\" successfully" May 13 00:16:16.866817 env[1212]: time="2025-05-13T00:16:16.866020060Z" level=info msg="StopPodSandbox for \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\" returns successfully" May 13 00:16:16.867377 env[1212]: time="2025-05-13T00:16:16.867338168Z" level=info msg="RemovePodSandbox for \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\"" May 13 00:16:16.867454 env[1212]: time="2025-05-13T00:16:16.867384852Z" level=info msg="Forcibly stopping sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\"" May 13 00:16:16.959955 sshd[5209]: pam_unix(sshd:session): session closed for user core May 13 00:16:16.963761 systemd[1]: Started sshd@17-10.0.0.7:22-10.0.0.1:59908.service. May 13 00:16:16.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.7:22-10.0.0.1:59908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:16.964000 audit[5209]: USER_END pid=5209 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.964000 audit[5209]: CRED_DISP pid=5209 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:16.967038 systemd[1]: sshd@16-10.0.0.7:22-10.0.0.1:59900.service: Deactivated successfully. May 13 00:16:16.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.7:22-10.0.0.1:59900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:16.967825 systemd[1]: session-17.scope: Deactivated successfully. May 13 00:16:16.968385 systemd-logind[1198]: Session 17 logged out. Waiting for processes to exit. May 13 00:16:16.969101 systemd-logind[1198]: Removed session 17. May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.931 [WARNING][5303] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b7eaf24b-58d9-45e5-b364-5ba55a087a71", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 15, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f02f5ce5491af6f5b4246b2540cac4c5656c5ee0a29e6bc6bd81025dec3e5ee3", Pod:"coredns-6f6b679f8f-kh2hc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5edb6773638", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.931 [INFO][5303] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.932 [INFO][5303] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" iface="eth0" netns="" May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.932 [INFO][5303] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.932 [INFO][5303] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.985 [INFO][5311] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" HandleID="k8s-pod-network.3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.985 [INFO][5311] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.985 [INFO][5311] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.994 [WARNING][5311] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" HandleID="k8s-pod-network.3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.995 [INFO][5311] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" HandleID="k8s-pod-network.3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" Workload="localhost-k8s-coredns--6f6b679f8f--kh2hc-eth0" May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.996 [INFO][5311] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:16:17.002355 env[1212]: 2025-05-13 00:16:16.999 [INFO][5303] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86" May 13 00:16:17.003491 env[1212]: time="2025-05-13T00:16:17.003328578Z" level=info msg="TearDown network for sandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\" successfully" May 13 00:16:17.006510 env[1212]: time="2025-05-13T00:16:17.006345585Z" level=info msg="RemovePodSandbox \"3c28dbcde11fb6b616dd928cbc7e3821beda0d967bd5d76aa9c8fe3ef2841e86\" returns successfully" May 13 00:16:17.014000 audit[5318]: USER_ACCT pid=5318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:17.015529 sshd[5318]: Accepted publickey for core from 10.0.0.1 port 59908 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:17.015000 audit[5318]: CRED_ACQ pid=5318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:17.015000 audit[5318]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffad85940 a2=3 a3=1 items=0 ppid=1 pid=5318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:17.015000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:17.016748 sshd[5318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:17.021293 systemd-logind[1198]: New session 18 of user core. May 13 00:16:17.021302 systemd[1]: Started session-18.scope. May 13 00:16:17.025000 audit[5318]: USER_START pid=5318 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:17.026000 audit[5323]: CRED_ACQ pid=5323 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.506000 audit[5338]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=5338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:18.506000 audit[5338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc07d5430 a2=0 a3=1 items=0 ppid=2094 pid=5338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:18.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:18.521647 sshd[5318]: pam_unix(sshd:session): session closed for user core May 13 00:16:18.521000 audit[5318]: USER_END pid=5318 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.522000 audit[5318]: CRED_DISP pid=5318 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.522000 audit[5338]: NETFILTER_CFG table=nat:118 family=2 entries=22 op=nft_register_rule pid=5338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:18.522000 audit[5338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc07d5430 a2=0 a3=1 items=0 ppid=2094 pid=5338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:18.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:18.525675 systemd[1]: Started sshd@18-10.0.0.7:22-10.0.0.1:59920.service. May 13 00:16:18.526256 systemd[1]: sshd@17-10.0.0.7:22-10.0.0.1:59908.service: Deactivated successfully. May 13 00:16:18.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.7:22-10.0.0.1:59920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:18.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.7:22-10.0.0.1:59908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:18.527025 systemd[1]: session-18.scope: Deactivated successfully. May 13 00:16:18.527602 systemd-logind[1198]: Session 18 logged out. Waiting for processes to exit. May 13 00:16:18.529061 systemd-logind[1198]: Removed session 18. May 13 00:16:18.545000 audit[5343]: NETFILTER_CFG table=filter:119 family=2 entries=32 op=nft_register_rule pid=5343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:18.545000 audit[5343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffcf894c80 a2=0 a3=1 items=0 ppid=2094 pid=5343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:18.545000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:18.553000 audit[5343]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=5343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:18.553000 audit[5343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffcf894c80 a2=0 a3=1 items=0 ppid=2094 pid=5343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:18.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:18.572000 audit[5340]: USER_ACCT pid=5340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.574291 sshd[5340]: Accepted publickey for core from 10.0.0.1 port 59920 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:18.574000 audit[5340]: CRED_ACQ pid=5340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.574000 audit[5340]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2fafdd0 a2=3 a3=1 items=0 ppid=1 pid=5340 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:18.574000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:18.576003 sshd[5340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:18.579788 systemd-logind[1198]: New session 19 of user core. May 13 00:16:18.580664 systemd[1]: Started session-19.scope. May 13 00:16:18.583000 audit[5340]: USER_START pid=5340 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.584000 audit[5345]: CRED_ACQ pid=5345 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.896981 sshd[5340]: pam_unix(sshd:session): session closed for user core May 13 00:16:18.896000 audit[5340]: USER_END pid=5340 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.896000 audit[5340]: CRED_DISP pid=5340 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.903032 systemd[1]: Started sshd@19-10.0.0.7:22-10.0.0.1:59930.service. May 13 00:16:18.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.7:22-10.0.0.1:59930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:18.905836 systemd[1]: sshd@18-10.0.0.7:22-10.0.0.1:59920.service: Deactivated successfully. May 13 00:16:18.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.7:22-10.0.0.1:59920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:18.906764 systemd[1]: session-19.scope: Deactivated successfully. May 13 00:16:18.908162 systemd-logind[1198]: Session 19 logged out. Waiting for processes to exit. May 13 00:16:18.909206 systemd-logind[1198]: Removed session 19. May 13 00:16:18.945000 audit[5354]: USER_ACCT pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.946820 sshd[5354]: Accepted publickey for core from 10.0.0.1 port 59930 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:18.946000 audit[5354]: CRED_ACQ pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.946000 audit[5354]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6046010 a2=3 a3=1 items=0 ppid=1 pid=5354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:18.946000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:18.948196 sshd[5354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:18.952333 systemd-logind[1198]: New session 20 of user core. May 13 00:16:18.952570 systemd[1]: Started session-20.scope. May 13 00:16:18.955000 audit[5354]: USER_START pid=5354 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:18.956000 audit[5357]: CRED_ACQ pid=5357 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:19.100652 sshd[5354]: pam_unix(sshd:session): session closed for user core May 13 00:16:19.100000 audit[5354]: USER_END pid=5354 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:19.100000 audit[5354]: CRED_DISP pid=5354 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:19.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.7:22-10.0.0.1:59930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:19.103100 systemd[1]: sshd@19-10.0.0.7:22-10.0.0.1:59930.service: Deactivated successfully. May 13 00:16:19.103855 systemd[1]: session-20.scope: Deactivated successfully. May 13 00:16:19.104573 systemd-logind[1198]: Session 20 logged out. Waiting for processes to exit. May 13 00:16:19.105363 systemd-logind[1198]: Removed session 20. May 13 00:16:20.796000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:20.796000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40027efe80 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:16:20.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:16:20.797000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:20.797000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40027efea0 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:16:20.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:16:20.797000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:20.797000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400297d320 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:16:20.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:16:20.797000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:16:20.797000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400297d340 a2=fc6 a3=0 items=0 ppid=1677 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c954 key=(null) May 13 00:16:20.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:16:24.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.7:22-10.0.0.1:42060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:24.105460 systemd[1]: Started sshd@20-10.0.0.7:22-10.0.0.1:42060.service. May 13 00:16:24.106515 kernel: kauditd_printk_skb: 69 callbacks suppressed May 13 00:16:24.106576 kernel: audit: type=1130 audit(1747095384.104:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.7:22-10.0.0.1:42060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:24.127000 audit[5384]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:24.127000 audit[5384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd031db40 a2=0 a3=1 items=0 ppid=2094 pid=5384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:24.133338 kernel: audit: type=1325 audit(1747095384.127:1482): table=filter:121 family=2 entries=20 op=nft_register_rule pid=5384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:24.133404 kernel: audit: type=1300 audit(1747095384.127:1482): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd031db40 a2=0 a3=1 items=0 ppid=2094 pid=5384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:24.133439 kernel: audit: type=1327 audit(1747095384.127:1482): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:24.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:24.139000 audit[5384]: NETFILTER_CFG table=nat:122 family=2 entries=106 op=nft_register_chain pid=5384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:24.139000 audit[5384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd031db40 a2=0 a3=1 items=0 ppid=2094 pid=5384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:24.145479 kernel: audit: type=1325 audit(1747095384.139:1483): table=nat:122 family=2 entries=106 op=nft_register_chain pid=5384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:16:24.145542 kernel: audit: type=1300 audit(1747095384.139:1483): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd031db40 a2=0 a3=1 items=0 ppid=2094 pid=5384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:24.145571 kernel: audit: type=1327 audit(1747095384.139:1483): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:24.139000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:16:24.149000 audit[5381]: USER_ACCT pid=5381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:24.151133 sshd[5381]: Accepted publickey for core from 10.0.0.1 port 42060 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:24.152507 sshd[5381]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:24.150000 audit[5381]: CRED_ACQ pid=5381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:24.156085 kernel: audit: type=1101 audit(1747095384.149:1484): pid=5381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:24.156170 kernel: audit: type=1103 audit(1747095384.150:1485): pid=5381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:24.157734 kernel: audit: type=1006 audit(1747095384.150:1486): pid=5381 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 13 00:16:24.150000 audit[5381]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd25e0e80 a2=3 a3=1 items=0 ppid=1 pid=5381 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:24.150000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:24.160621 systemd-logind[1198]: New session 21 of user core. May 13 00:16:24.161499 systemd[1]: Started session-21.scope. May 13 00:16:24.164000 audit[5381]: USER_START pid=5381 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:24.165000 audit[5386]: CRED_ACQ pid=5386 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:24.277726 sshd[5381]: pam_unix(sshd:session): session closed for user core May 13 00:16:24.277000 audit[5381]: USER_END pid=5381 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:24.277000 audit[5381]: CRED_DISP pid=5381 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:24.280496 systemd[1]: sshd@20-10.0.0.7:22-10.0.0.1:42060.service: Deactivated successfully. May 13 00:16:24.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.7:22-10.0.0.1:42060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:24.281285 systemd[1]: session-21.scope: Deactivated successfully. May 13 00:16:24.281798 systemd-logind[1198]: Session 21 logged out. Waiting for processes to exit. May 13 00:16:24.282512 systemd-logind[1198]: Removed session 21. May 13 00:16:24.863530 systemd[1]: run-containerd-runc-k8s.io-349632db60c8892e288aa90279ef9a79f14e22d64a216781efd98f9928310016-runc.jEIqG3.mount: Deactivated successfully. May 13 00:16:24.918839 kubelet[1951]: E0513 00:16:24.918800 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:16:29.282514 systemd[1]: Started sshd@21-10.0.0.7:22-10.0.0.1:42076.service. May 13 00:16:29.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.7:22-10.0.0.1:42076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:29.285371 kernel: kauditd_printk_skb: 7 callbacks suppressed May 13 00:16:29.285453 kernel: audit: type=1130 audit(1747095389.281:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.7:22-10.0.0.1:42076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:29.326000 audit[5419]: USER_ACCT pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.327668 sshd[5419]: Accepted publickey for core from 10.0.0.1 port 42076 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:29.328718 sshd[5419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:29.327000 audit[5419]: CRED_ACQ pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.331943 kernel: audit: type=1101 audit(1747095389.326:1493): pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.332013 kernel: audit: type=1103 audit(1747095389.327:1494): pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.332036 kernel: audit: type=1006 audit(1747095389.327:1495): pid=5419 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 13 00:16:29.327000 audit[5419]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3a04630 a2=3 a3=1 items=0 ppid=1 pid=5419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:29.333786 systemd-logind[1198]: New session 22 of user core. May 13 00:16:29.334183 systemd[1]: Started session-22.scope. May 13 00:16:29.335474 kernel: audit: type=1300 audit(1747095389.327:1495): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3a04630 a2=3 a3=1 items=0 ppid=1 pid=5419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:29.335539 kernel: audit: type=1327 audit(1747095389.327:1495): proctitle=737368643A20636F7265205B707269765D May 13 00:16:29.327000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:29.337000 audit[5419]: USER_START pid=5419 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.338000 audit[5421]: CRED_ACQ pid=5421 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.342948 kernel: audit: type=1105 audit(1747095389.337:1496): pid=5419 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.342994 kernel: audit: type=1103 audit(1747095389.338:1497): pid=5421 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.467605 sshd[5419]: pam_unix(sshd:session): session closed for user core May 13 00:16:29.467000 audit[5419]: USER_END pid=5419 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.469931 systemd[1]: session-22.scope: Deactivated successfully. May 13 00:16:29.470569 systemd-logind[1198]: Session 22 logged out. Waiting for processes to exit. May 13 00:16:29.470657 systemd[1]: sshd@21-10.0.0.7:22-10.0.0.1:42076.service: Deactivated successfully. May 13 00:16:29.467000 audit[5419]: CRED_DISP pid=5419 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.471736 systemd-logind[1198]: Removed session 22. May 13 00:16:29.472997 kernel: audit: type=1106 audit(1747095389.467:1498): pid=5419 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.473046 kernel: audit: type=1104 audit(1747095389.467:1499): pid=5419 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:29.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.7:22-10.0.0.1:42076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:30.829742 kubelet[1951]: E0513 00:16:30.829690 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:16:34.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.7:22-10.0.0.1:40948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:34.472765 systemd[1]: Started sshd@22-10.0.0.7:22-10.0.0.1:40948.service. May 13 00:16:34.473811 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:16:34.473840 kernel: audit: type=1130 audit(1747095394.472:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.7:22-10.0.0.1:40948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:34.522000 audit[5432]: USER_ACCT pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.522903 sshd[5432]: Accepted publickey for core from 10.0.0.1 port 40948 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:34.526306 kernel: audit: type=1101 audit(1747095394.522:1502): pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.526000 audit[5432]: CRED_ACQ pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.527242 sshd[5432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:34.530236 kernel: audit: type=1103 audit(1747095394.526:1503): pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.530309 kernel: audit: type=1006 audit(1747095394.526:1504): pid=5432 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 13 00:16:34.530506 kernel: audit: type=1300 audit(1747095394.526:1504): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed7d50b0 a2=3 a3=1 items=0 ppid=1 pid=5432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:34.526000 audit[5432]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed7d50b0 a2=3 a3=1 items=0 ppid=1 pid=5432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:34.532555 kernel: audit: type=1327 audit(1747095394.526:1504): proctitle=737368643A20636F7265205B707269765D May 13 00:16:34.526000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:34.535621 systemd-logind[1198]: New session 23 of user core. May 13 00:16:34.535740 systemd[1]: Started session-23.scope. May 13 00:16:34.540000 audit[5432]: USER_START pid=5432 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.541000 audit[5434]: CRED_ACQ pid=5434 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.545255 kernel: audit: type=1105 audit(1747095394.540:1505): pid=5432 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.545324 kernel: audit: type=1103 audit(1747095394.541:1506): pid=5434 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.665145 sshd[5432]: pam_unix(sshd:session): session closed for user core May 13 00:16:34.666000 audit[5432]: USER_END pid=5432 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.668070 systemd[1]: sshd@22-10.0.0.7:22-10.0.0.1:40948.service: Deactivated successfully. May 13 00:16:34.668810 systemd[1]: session-23.scope: Deactivated successfully. May 13 00:16:34.666000 audit[5432]: CRED_DISP pid=5432 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.669392 systemd-logind[1198]: Session 23 logged out. Waiting for processes to exit. May 13 00:16:34.670124 systemd-logind[1198]: Removed session 23. May 13 00:16:34.671337 kernel: audit: type=1106 audit(1747095394.666:1507): pid=5432 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.671394 kernel: audit: type=1104 audit(1747095394.666:1508): pid=5432 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:34.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.7:22-10.0.0.1:40948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:39.668369 systemd[1]: Started sshd@23-10.0.0.7:22-10.0.0.1:40954.service. May 13 00:16:39.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.7:22-10.0.0.1:40954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:39.671947 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:16:39.671991 kernel: audit: type=1130 audit(1747095399.668:1510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.7:22-10.0.0.1:40954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:39.712000 audit[5453]: USER_ACCT pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.712468 sshd[5453]: Accepted publickey for core from 10.0.0.1 port 40954 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:16:39.714665 sshd[5453]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:16:39.714000 audit[5453]: CRED_ACQ pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.717451 kernel: audit: type=1101 audit(1747095399.712:1511): pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.717536 kernel: audit: type=1103 audit(1747095399.714:1512): pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.717561 kernel: audit: type=1006 audit(1747095399.714:1513): pid=5453 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 13 00:16:39.719030 kernel: audit: type=1300 audit(1747095399.714:1513): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffded6bb10 a2=3 a3=1 items=0 ppid=1 pid=5453 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:39.714000 audit[5453]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffded6bb10 a2=3 a3=1 items=0 ppid=1 pid=5453 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:16:39.714000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:16:39.722518 kernel: audit: type=1327 audit(1747095399.714:1513): proctitle=737368643A20636F7265205B707269765D May 13 00:16:39.724828 systemd-logind[1198]: New session 24 of user core. May 13 00:16:39.725686 systemd[1]: Started session-24.scope. May 13 00:16:39.728000 audit[5453]: USER_START pid=5453 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.730000 audit[5455]: CRED_ACQ pid=5455 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.734030 kernel: audit: type=1105 audit(1747095399.728:1514): pid=5453 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.734104 kernel: audit: type=1103 audit(1747095399.730:1515): pid=5455 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.828706 kubelet[1951]: E0513 00:16:39.828671 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:16:39.876709 sshd[5453]: pam_unix(sshd:session): session closed for user core May 13 00:16:39.877000 audit[5453]: USER_END pid=5453 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.880006 systemd[1]: sshd@23-10.0.0.7:22-10.0.0.1:40954.service: Deactivated successfully. May 13 00:16:39.878000 audit[5453]: CRED_DISP pid=5453 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.880827 systemd[1]: session-24.scope: Deactivated successfully. May 13 00:16:39.881696 systemd-logind[1198]: Session 24 logged out. Waiting for processes to exit. May 13 00:16:39.882421 systemd-logind[1198]: Removed session 24. May 13 00:16:39.883076 kernel: audit: type=1106 audit(1747095399.877:1516): pid=5453 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.883135 kernel: audit: type=1104 audit(1747095399.878:1517): pid=5453 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:16:39.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.7:22-10.0.0.1:40954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:16:40.828663 kubelet[1951]: E0513 00:16:40.828624 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"