May 13 00:39:35.757584 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 13 00:39:35.757606 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon May 12 23:22:00 -00 2025 May 13 00:39:35.757614 kernel: efi: EFI v2.70 by EDK II May 13 00:39:35.757620 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 13 00:39:35.757626 kernel: random: crng init done May 13 00:39:35.757631 kernel: ACPI: Early table checksum verification disabled May 13 00:39:35.757638 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 13 00:39:35.757645 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 13 00:39:35.757650 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:35.757656 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:35.757662 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:35.757667 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:35.757673 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:35.757678 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:35.757686 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:35.757692 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:35.757698 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:35.757704 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 13 00:39:35.757710 kernel: NUMA: Failed to initialise from firmware May 13 00:39:35.757716 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:39:35.757722 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 13 00:39:35.757728 kernel: Zone ranges: May 13 00:39:35.757734 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:39:35.757741 kernel: DMA32 empty May 13 00:39:35.757746 kernel: Normal empty May 13 00:39:35.757752 kernel: Movable zone start for each node May 13 00:39:35.757758 kernel: Early memory node ranges May 13 00:39:35.757764 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 13 00:39:35.757770 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 13 00:39:35.757776 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 13 00:39:35.757781 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 13 00:39:35.757787 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 13 00:39:35.757793 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 13 00:39:35.757799 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 13 00:39:35.757804 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:39:35.757812 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 13 00:39:35.757818 kernel: psci: probing for conduit method from ACPI. May 13 00:39:35.757824 kernel: psci: PSCIv1.1 detected in firmware. May 13 00:39:35.757829 kernel: psci: Using standard PSCI v0.2 function IDs May 13 00:39:35.757836 kernel: psci: Trusted OS migration not required May 13 00:39:35.757844 kernel: psci: SMC Calling Convention v1.1 May 13 00:39:35.757850 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 13 00:39:35.757858 kernel: ACPI: SRAT not present May 13 00:39:35.757864 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 13 00:39:35.757871 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 13 00:39:35.757877 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 13 00:39:35.757883 kernel: Detected PIPT I-cache on CPU0 May 13 00:39:35.757890 kernel: CPU features: detected: GIC system register CPU interface May 13 00:39:35.757896 kernel: CPU features: detected: Hardware dirty bit management May 13 00:39:35.757902 kernel: CPU features: detected: Spectre-v4 May 13 00:39:35.757908 kernel: CPU features: detected: Spectre-BHB May 13 00:39:35.757916 kernel: CPU features: kernel page table isolation forced ON by KASLR May 13 00:39:35.757922 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 13 00:39:35.757928 kernel: CPU features: detected: ARM erratum 1418040 May 13 00:39:35.757935 kernel: CPU features: detected: SSBS not fully self-synchronizing May 13 00:39:35.757941 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 13 00:39:35.757947 kernel: Policy zone: DMA May 13 00:39:35.757954 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=ae60136413c5686d5b1e9c38408a367f831e354d706496e9f743f02289aad53d May 13 00:39:35.757961 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:39:35.757967 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 00:39:35.757973 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:39:35.757980 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:39:35.757987 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36480K init, 777K bss, 114948K reserved, 0K cma-reserved) May 13 00:39:35.757994 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 13 00:39:35.758000 kernel: trace event string verifier disabled May 13 00:39:35.758006 kernel: rcu: Preemptible hierarchical RCU implementation. May 13 00:39:35.758013 kernel: rcu: RCU event tracing is enabled. May 13 00:39:35.758019 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 13 00:39:35.758025 kernel: Trampoline variant of Tasks RCU enabled. May 13 00:39:35.758032 kernel: Tracing variant of Tasks RCU enabled. May 13 00:39:35.758038 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:39:35.758044 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 13 00:39:35.758050 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 13 00:39:35.758058 kernel: GICv3: 256 SPIs implemented May 13 00:39:35.758064 kernel: GICv3: 0 Extended SPIs implemented May 13 00:39:35.758070 kernel: GICv3: Distributor has no Range Selector support May 13 00:39:35.758076 kernel: Root IRQ handler: gic_handle_irq May 13 00:39:35.758083 kernel: GICv3: 16 PPIs implemented May 13 00:39:35.758089 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 13 00:39:35.758095 kernel: ACPI: SRAT not present May 13 00:39:35.758101 kernel: ITS [mem 0x08080000-0x0809ffff] May 13 00:39:35.758114 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 13 00:39:35.758123 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 13 00:39:35.758130 kernel: GICv3: using LPI property table @0x00000000400d0000 May 13 00:39:35.758136 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 13 00:39:35.758144 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:39:35.758150 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 13 00:39:35.758157 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 13 00:39:35.758163 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 13 00:39:35.758170 kernel: arm-pv: using stolen time PV May 13 00:39:35.758176 kernel: Console: colour dummy device 80x25 May 13 00:39:35.758183 kernel: ACPI: Core revision 20210730 May 13 00:39:35.758189 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 13 00:39:35.758196 kernel: pid_max: default: 32768 minimum: 301 May 13 00:39:35.758202 kernel: LSM: Security Framework initializing May 13 00:39:35.758210 kernel: SELinux: Initializing. May 13 00:39:35.758217 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:39:35.758223 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:39:35.758230 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 13 00:39:35.758236 kernel: rcu: Hierarchical SRCU implementation. May 13 00:39:35.758242 kernel: Platform MSI: ITS@0x8080000 domain created May 13 00:39:35.758249 kernel: PCI/MSI: ITS@0x8080000 domain created May 13 00:39:35.758255 kernel: Remapping and enabling EFI services. May 13 00:39:35.758261 kernel: smp: Bringing up secondary CPUs ... May 13 00:39:35.758269 kernel: Detected PIPT I-cache on CPU1 May 13 00:39:35.758275 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 13 00:39:35.758282 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 13 00:39:35.758288 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:39:35.758295 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 13 00:39:35.758301 kernel: Detected PIPT I-cache on CPU2 May 13 00:39:35.758308 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 13 00:39:35.758314 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 13 00:39:35.758321 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:39:35.758327 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 13 00:39:35.758335 kernel: Detected PIPT I-cache on CPU3 May 13 00:39:35.758341 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 13 00:39:35.758348 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 13 00:39:35.758354 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:39:35.758365 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 13 00:39:35.758373 kernel: smp: Brought up 1 node, 4 CPUs May 13 00:39:35.758380 kernel: SMP: Total of 4 processors activated. May 13 00:39:35.758386 kernel: CPU features: detected: 32-bit EL0 Support May 13 00:39:35.758393 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 13 00:39:35.758424 kernel: CPU features: detected: Common not Private translations May 13 00:39:35.758433 kernel: CPU features: detected: CRC32 instructions May 13 00:39:35.758440 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 13 00:39:35.758448 kernel: CPU features: detected: LSE atomic instructions May 13 00:39:35.758455 kernel: CPU features: detected: Privileged Access Never May 13 00:39:35.758462 kernel: CPU features: detected: RAS Extension Support May 13 00:39:35.758472 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 13 00:39:35.758479 kernel: CPU: All CPU(s) started at EL1 May 13 00:39:35.758489 kernel: alternatives: patching kernel code May 13 00:39:35.758502 kernel: devtmpfs: initialized May 13 00:39:35.758518 kernel: KASLR enabled May 13 00:39:35.758526 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:39:35.758532 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 13 00:39:35.758539 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:39:35.758546 kernel: SMBIOS 3.0.0 present. May 13 00:39:35.758553 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 13 00:39:35.758560 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:39:35.758571 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 13 00:39:35.758579 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 13 00:39:35.758585 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 13 00:39:35.758592 kernel: audit: initializing netlink subsys (disabled) May 13 00:39:35.758599 kernel: audit: type=2000 audit(0.040:1): state=initialized audit_enabled=0 res=1 May 13 00:39:35.758606 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:39:35.758613 kernel: cpuidle: using governor menu May 13 00:39:35.758619 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 13 00:39:35.758626 kernel: ASID allocator initialised with 32768 entries May 13 00:39:35.758634 kernel: ACPI: bus type PCI registered May 13 00:39:35.758641 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:39:35.758648 kernel: Serial: AMBA PL011 UART driver May 13 00:39:35.758654 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:39:35.758661 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 13 00:39:35.758670 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:39:35.758677 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 13 00:39:35.758684 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:39:35.758691 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 13 00:39:35.758701 kernel: ACPI: Added _OSI(Module Device) May 13 00:39:35.758708 kernel: ACPI: Added _OSI(Processor Device) May 13 00:39:35.758715 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:39:35.758721 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:39:35.758728 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:39:35.758735 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:39:35.758767 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:39:35.758774 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:39:35.758783 kernel: ACPI: Interpreter enabled May 13 00:39:35.758798 kernel: ACPI: Using GIC for interrupt routing May 13 00:39:35.758805 kernel: ACPI: MCFG table detected, 1 entries May 13 00:39:35.758812 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 13 00:39:35.758819 kernel: printk: console [ttyAMA0] enabled May 13 00:39:35.758826 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 00:39:35.758963 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:39:35.759029 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 13 00:39:35.759091 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 13 00:39:35.759169 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 13 00:39:35.759233 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 13 00:39:35.759242 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 13 00:39:35.759249 kernel: PCI host bridge to bus 0000:00 May 13 00:39:35.759314 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 13 00:39:35.759367 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 13 00:39:35.759422 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 13 00:39:35.759480 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 00:39:35.759576 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 13 00:39:35.759651 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 13 00:39:35.759716 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 13 00:39:35.759779 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 13 00:39:35.759843 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 13 00:39:35.759908 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 13 00:39:35.759972 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 13 00:39:35.760034 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 13 00:39:35.760092 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 13 00:39:35.760160 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 13 00:39:35.760217 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 13 00:39:35.760226 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 13 00:39:35.760233 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 13 00:39:35.760242 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 13 00:39:35.760249 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 13 00:39:35.760256 kernel: iommu: Default domain type: Translated May 13 00:39:35.760263 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 13 00:39:35.760269 kernel: vgaarb: loaded May 13 00:39:35.760276 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:39:35.760283 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:39:35.760290 kernel: PTP clock support registered May 13 00:39:35.760297 kernel: Registered efivars operations May 13 00:39:35.760305 kernel: clocksource: Switched to clocksource arch_sys_counter May 13 00:39:35.760312 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:39:35.760319 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:39:35.760326 kernel: pnp: PnP ACPI init May 13 00:39:35.760394 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 13 00:39:35.760404 kernel: pnp: PnP ACPI: found 1 devices May 13 00:39:35.760410 kernel: NET: Registered PF_INET protocol family May 13 00:39:35.760418 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 00:39:35.760432 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 00:39:35.760440 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:39:35.760447 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:39:35.760454 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 00:39:35.760461 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 00:39:35.760468 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:39:35.760475 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:39:35.760481 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:39:35.760488 kernel: PCI: CLS 0 bytes, default 64 May 13 00:39:35.760508 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 13 00:39:35.760515 kernel: kvm [1]: HYP mode not available May 13 00:39:35.760522 kernel: Initialise system trusted keyrings May 13 00:39:35.760529 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 00:39:35.760536 kernel: Key type asymmetric registered May 13 00:39:35.760543 kernel: Asymmetric key parser 'x509' registered May 13 00:39:35.760550 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:39:35.760556 kernel: io scheduler mq-deadline registered May 13 00:39:35.760563 kernel: io scheduler kyber registered May 13 00:39:35.760573 kernel: io scheduler bfq registered May 13 00:39:35.760581 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 13 00:39:35.760590 kernel: ACPI: button: Power Button [PWRB] May 13 00:39:35.760602 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 13 00:39:35.760676 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 13 00:39:35.760685 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:39:35.760692 kernel: thunder_xcv, ver 1.0 May 13 00:39:35.760699 kernel: thunder_bgx, ver 1.0 May 13 00:39:35.760705 kernel: nicpf, ver 1.0 May 13 00:39:35.760714 kernel: nicvf, ver 1.0 May 13 00:39:35.760799 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 13 00:39:35.760862 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-13T00:39:35 UTC (1747096775) May 13 00:39:35.760874 kernel: hid: raw HID events driver (C) Jiri Kosina May 13 00:39:35.760881 kernel: NET: Registered PF_INET6 protocol family May 13 00:39:35.760888 kernel: Segment Routing with IPv6 May 13 00:39:35.760894 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:39:35.760901 kernel: NET: Registered PF_PACKET protocol family May 13 00:39:35.760913 kernel: Key type dns_resolver registered May 13 00:39:35.760920 kernel: registered taskstats version 1 May 13 00:39:35.760927 kernel: Loading compiled-in X.509 certificates May 13 00:39:35.760934 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: d291b704d59536a3c0ba96fd6f5a99459de8de99' May 13 00:39:35.760941 kernel: Key type .fscrypt registered May 13 00:39:35.760950 kernel: Key type fscrypt-provisioning registered May 13 00:39:35.760958 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:39:35.760965 kernel: ima: Allocated hash algorithm: sha1 May 13 00:39:35.760971 kernel: ima: No architecture policies found May 13 00:39:35.760980 kernel: clk: Disabling unused clocks May 13 00:39:35.760987 kernel: Freeing unused kernel memory: 36480K May 13 00:39:35.760996 kernel: Run /init as init process May 13 00:39:35.761002 kernel: with arguments: May 13 00:39:35.761009 kernel: /init May 13 00:39:35.761015 kernel: with environment: May 13 00:39:35.761022 kernel: HOME=/ May 13 00:39:35.761028 kernel: TERM=linux May 13 00:39:35.761035 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:39:35.761048 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:39:35.761057 systemd[1]: Detected virtualization kvm. May 13 00:39:35.761065 systemd[1]: Detected architecture arm64. May 13 00:39:35.761072 systemd[1]: Running in initrd. May 13 00:39:35.761079 systemd[1]: No hostname configured, using default hostname. May 13 00:39:35.761088 systemd[1]: Hostname set to . May 13 00:39:35.761096 systemd[1]: Initializing machine ID from VM UUID. May 13 00:39:35.761105 systemd[1]: Queued start job for default target initrd.target. May 13 00:39:35.761120 systemd[1]: Started systemd-ask-password-console.path. May 13 00:39:35.761127 systemd[1]: Reached target cryptsetup.target. May 13 00:39:35.761138 systemd[1]: Reached target paths.target. May 13 00:39:35.761145 systemd[1]: Reached target slices.target. May 13 00:39:35.761152 systemd[1]: Reached target swap.target. May 13 00:39:35.761161 systemd[1]: Reached target timers.target. May 13 00:39:35.761170 systemd[1]: Listening on iscsid.socket. May 13 00:39:35.761179 systemd[1]: Listening on iscsiuio.socket. May 13 00:39:35.761186 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:39:35.761196 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:39:35.761203 systemd[1]: Listening on systemd-journald.socket. May 13 00:39:35.761212 systemd[1]: Listening on systemd-networkd.socket. May 13 00:39:35.761220 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:39:35.761227 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:39:35.761235 systemd[1]: Reached target sockets.target. May 13 00:39:35.761244 systemd[1]: Starting kmod-static-nodes.service... May 13 00:39:35.761251 systemd[1]: Finished network-cleanup.service. May 13 00:39:35.761260 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:39:35.761268 systemd[1]: Starting systemd-journald.service... May 13 00:39:35.761275 systemd[1]: Starting systemd-modules-load.service... May 13 00:39:35.761282 systemd[1]: Starting systemd-resolved.service... May 13 00:39:35.761290 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:39:35.761297 systemd[1]: Finished kmod-static-nodes.service. May 13 00:39:35.761304 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:39:35.761313 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:39:35.761320 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:39:35.761327 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:39:35.761337 systemd-journald[289]: Journal started May 13 00:39:35.761380 systemd-journald[289]: Runtime Journal (/run/log/journal/e5d4b9cf88294d6db9b8102dca182dc8) is 6.0M, max 48.7M, 42.6M free. May 13 00:39:35.758760 systemd-modules-load[290]: Inserted module 'overlay' May 13 00:39:35.765046 systemd[1]: Started systemd-journald.service. May 13 00:39:35.765376 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:39:35.772152 kernel: audit: type=1130 audit(1747096775.764:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.772173 kernel: audit: type=1130 audit(1747096775.765:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.777373 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:39:35.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.777940 systemd-resolved[291]: Positive Trust Anchors: May 13 00:39:35.785133 kernel: audit: type=1130 audit(1747096775.777:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.785156 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:39:35.777947 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:39:35.777973 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:39:35.795333 kernel: Bridge firewalling registered May 13 00:39:35.795356 kernel: audit: type=1130 audit(1747096775.787:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.781816 systemd[1]: Starting dracut-cmdline.service... May 13 00:39:35.783075 systemd-resolved[291]: Defaulting to hostname 'linux'. May 13 00:39:35.785901 systemd[1]: Started systemd-resolved.service. May 13 00:39:35.787728 systemd[1]: Reached target nss-lookup.target. May 13 00:39:35.792947 systemd-modules-load[290]: Inserted module 'br_netfilter' May 13 00:39:35.802575 dracut-cmdline[307]: dracut-dracut-053 May 13 00:39:35.805090 dracut-cmdline[307]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=ae60136413c5686d5b1e9c38408a367f831e354d706496e9f743f02289aad53d May 13 00:39:35.810508 kernel: SCSI subsystem initialized May 13 00:39:35.817847 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:39:35.817886 kernel: device-mapper: uevent: version 1.0.3 May 13 00:39:35.819336 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:39:35.822184 systemd-modules-load[290]: Inserted module 'dm_multipath' May 13 00:39:35.822990 systemd[1]: Finished systemd-modules-load.service. May 13 00:39:35.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.824631 systemd[1]: Starting systemd-sysctl.service... May 13 00:39:35.828192 kernel: audit: type=1130 audit(1747096775.823:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.833502 systemd[1]: Finished systemd-sysctl.service. May 13 00:39:35.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.837522 kernel: audit: type=1130 audit(1747096775.833:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.871520 kernel: Loading iSCSI transport class v2.0-870. May 13 00:39:35.884538 kernel: iscsi: registered transport (tcp) May 13 00:39:35.898872 kernel: iscsi: registered transport (qla4xxx) May 13 00:39:35.898894 kernel: QLogic iSCSI HBA Driver May 13 00:39:35.935002 systemd[1]: Finished dracut-cmdline.service. May 13 00:39:35.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.936725 systemd[1]: Starting dracut-pre-udev.service... May 13 00:39:35.940186 kernel: audit: type=1130 audit(1747096775.935:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.984551 kernel: raid6: neonx8 gen() 13347 MB/s May 13 00:39:36.001537 kernel: raid6: neonx8 xor() 10770 MB/s May 13 00:39:36.018517 kernel: raid6: neonx4 gen() 13535 MB/s May 13 00:39:36.035534 kernel: raid6: neonx4 xor() 11208 MB/s May 13 00:39:36.052527 kernel: raid6: neonx2 gen() 12943 MB/s May 13 00:39:36.069535 kernel: raid6: neonx2 xor() 10478 MB/s May 13 00:39:36.086516 kernel: raid6: neonx1 gen() 10574 MB/s May 13 00:39:36.103536 kernel: raid6: neonx1 xor() 8768 MB/s May 13 00:39:36.120527 kernel: raid6: int64x8 gen() 6260 MB/s May 13 00:39:36.137521 kernel: raid6: int64x8 xor() 3541 MB/s May 13 00:39:36.154519 kernel: raid6: int64x4 gen() 7205 MB/s May 13 00:39:36.171517 kernel: raid6: int64x4 xor() 3851 MB/s May 13 00:39:36.188519 kernel: raid6: int64x2 gen() 6147 MB/s May 13 00:39:36.205515 kernel: raid6: int64x2 xor() 3320 MB/s May 13 00:39:36.222518 kernel: raid6: int64x1 gen() 5040 MB/s May 13 00:39:36.239574 kernel: raid6: int64x1 xor() 2644 MB/s May 13 00:39:36.239585 kernel: raid6: using algorithm neonx4 gen() 13535 MB/s May 13 00:39:36.239602 kernel: raid6: .... xor() 11208 MB/s, rmw enabled May 13 00:39:36.240619 kernel: raid6: using neon recovery algorithm May 13 00:39:36.250519 kernel: xor: measuring software checksum speed May 13 00:39:36.251729 kernel: 8regs : 15116 MB/sec May 13 00:39:36.251741 kernel: 32regs : 20088 MB/sec May 13 00:39:36.252937 kernel: arm64_neon : 27682 MB/sec May 13 00:39:36.252949 kernel: xor: using function: arm64_neon (27682 MB/sec) May 13 00:39:36.305540 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 13 00:39:36.316259 systemd[1]: Finished dracut-pre-udev.service. May 13 00:39:36.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:36.319000 audit: BPF prog-id=7 op=LOAD May 13 00:39:36.320712 kernel: audit: type=1130 audit(1747096776.316:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:36.320736 kernel: audit: type=1334 audit(1747096776.319:10): prog-id=7 op=LOAD May 13 00:39:36.320000 audit: BPF prog-id=8 op=LOAD May 13 00:39:36.321177 systemd[1]: Starting systemd-udevd.service... May 13 00:39:36.335158 systemd-udevd[490]: Using default interface naming scheme 'v252'. May 13 00:39:36.338434 systemd[1]: Started systemd-udevd.service. May 13 00:39:36.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:36.339982 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:39:36.352066 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation May 13 00:39:36.379084 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:39:36.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:36.380587 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:39:36.413616 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:39:36.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:36.444166 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 13 00:39:36.449071 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 00:39:36.449085 kernel: GPT:9289727 != 19775487 May 13 00:39:36.449094 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 00:39:36.449102 kernel: GPT:9289727 != 19775487 May 13 00:39:36.449117 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 00:39:36.449127 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:39:36.460519 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (552) May 13 00:39:36.462889 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:39:36.463825 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:39:36.471567 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:39:36.475631 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:39:36.478875 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:39:36.480592 systemd[1]: Starting disk-uuid.service... May 13 00:39:36.486649 disk-uuid[563]: Primary Header is updated. May 13 00:39:36.486649 disk-uuid[563]: Secondary Entries is updated. May 13 00:39:36.486649 disk-uuid[563]: Secondary Header is updated. May 13 00:39:36.489674 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:39:37.501526 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:39:37.501730 disk-uuid[564]: The operation has completed successfully. May 13 00:39:37.523685 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:39:37.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.523787 systemd[1]: Finished disk-uuid.service. May 13 00:39:37.527844 systemd[1]: Starting verity-setup.service... May 13 00:39:37.552191 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 13 00:39:37.578914 systemd[1]: Found device dev-mapper-usr.device. May 13 00:39:37.581437 systemd[1]: Mounting sysusr-usr.mount... May 13 00:39:37.583412 systemd[1]: Finished verity-setup.service. May 13 00:39:37.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.630169 systemd[1]: Mounted sysusr-usr.mount. May 13 00:39:37.631534 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:39:37.631017 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 00:39:37.631788 systemd[1]: Starting ignition-setup.service... May 13 00:39:37.634040 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:39:37.641175 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 13 00:39:37.641215 kernel: BTRFS info (device vda6): using free space tree May 13 00:39:37.641225 kernel: BTRFS info (device vda6): has skinny extents May 13 00:39:37.650003 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:39:37.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.658600 systemd[1]: Finished ignition-setup.service. May 13 00:39:37.660278 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:39:37.717005 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:39:37.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.718000 audit: BPF prog-id=9 op=LOAD May 13 00:39:37.719214 systemd[1]: Starting systemd-networkd.service... May 13 00:39:37.741551 ignition[657]: Ignition 2.14.0 May 13 00:39:37.741561 ignition[657]: Stage: fetch-offline May 13 00:39:37.741599 ignition[657]: no configs at "/usr/lib/ignition/base.d" May 13 00:39:37.741608 ignition[657]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:37.741728 ignition[657]: parsed url from cmdline: "" May 13 00:39:37.741731 ignition[657]: no config URL provided May 13 00:39:37.741736 ignition[657]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:39:37.741742 ignition[657]: no config at "/usr/lib/ignition/user.ign" May 13 00:39:37.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.741760 ignition[657]: op(1): [started] loading QEMU firmware config module May 13 00:39:37.748208 systemd-networkd[740]: lo: Link UP May 13 00:39:37.741764 ignition[657]: op(1): executing: "modprobe" "qemu_fw_cfg" May 13 00:39:37.748212 systemd-networkd[740]: lo: Gained carrier May 13 00:39:37.745987 ignition[657]: op(1): [finished] loading QEMU firmware config module May 13 00:39:37.748567 systemd-networkd[740]: Enumeration completed May 13 00:39:37.748669 systemd[1]: Started systemd-networkd.service. May 13 00:39:37.748735 systemd-networkd[740]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:39:37.749808 systemd[1]: Reached target network.target. May 13 00:39:37.749812 systemd-networkd[740]: eth0: Link UP May 13 00:39:37.749815 systemd-networkd[740]: eth0: Gained carrier May 13 00:39:37.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.751345 systemd[1]: Starting iscsiuio.service... May 13 00:39:37.760916 systemd[1]: Started iscsiuio.service. May 13 00:39:37.762544 systemd[1]: Starting iscsid.service... May 13 00:39:37.765902 iscsid[747]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:39:37.765902 iscsid[747]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:39:37.765902 iscsid[747]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:39:37.765902 iscsid[747]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:39:37.765902 iscsid[747]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:39:37.765902 iscsid[747]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:39:37.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.768629 systemd[1]: Started iscsid.service. May 13 00:39:37.774620 systemd[1]: Starting dracut-initqueue.service... May 13 00:39:37.780582 systemd-networkd[740]: eth0: DHCPv4 address 10.0.0.136/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:39:37.785607 systemd[1]: Finished dracut-initqueue.service. May 13 00:39:37.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.786561 systemd[1]: Reached target remote-fs-pre.target. May 13 00:39:37.788115 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:39:37.789683 systemd[1]: Reached target remote-fs.target. May 13 00:39:37.791970 systemd[1]: Starting dracut-pre-mount.service... May 13 00:39:37.799574 systemd[1]: Finished dracut-pre-mount.service. May 13 00:39:37.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.814279 ignition[657]: parsing config with SHA512: 606270a29eea3527ac4552f9be120d4a4c2c625ce614444ace7d7371fcfcd03455afa1252c952a8b175043a6bcc3795f3afa3c6e55c000852f3152d065dff189 May 13 00:39:37.821372 unknown[657]: fetched base config from "system" May 13 00:39:37.821383 unknown[657]: fetched user config from "qemu" May 13 00:39:37.821904 ignition[657]: fetch-offline: fetch-offline passed May 13 00:39:37.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.823045 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:39:37.821964 ignition[657]: Ignition finished successfully May 13 00:39:37.824451 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:39:37.825272 systemd[1]: Starting ignition-kargs.service... May 13 00:39:37.834195 ignition[761]: Ignition 2.14.0 May 13 00:39:37.834204 ignition[761]: Stage: kargs May 13 00:39:37.834296 ignition[761]: no configs at "/usr/lib/ignition/base.d" May 13 00:39:37.834305 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:37.835117 ignition[761]: kargs: kargs passed May 13 00:39:37.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.837223 systemd[1]: Finished ignition-kargs.service. May 13 00:39:37.835157 ignition[761]: Ignition finished successfully May 13 00:39:37.839573 systemd[1]: Starting ignition-disks.service... May 13 00:39:37.845642 ignition[767]: Ignition 2.14.0 May 13 00:39:37.845650 ignition[767]: Stage: disks May 13 00:39:37.845735 ignition[767]: no configs at "/usr/lib/ignition/base.d" May 13 00:39:37.847649 systemd[1]: Finished ignition-disks.service. May 13 00:39:37.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.845746 ignition[767]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:37.849065 systemd[1]: Reached target initrd-root-device.target. May 13 00:39:37.846525 ignition[767]: disks: disks passed May 13 00:39:37.850321 systemd[1]: Reached target local-fs-pre.target. May 13 00:39:37.846563 ignition[767]: Ignition finished successfully May 13 00:39:37.851880 systemd[1]: Reached target local-fs.target. May 13 00:39:37.853176 systemd[1]: Reached target sysinit.target. May 13 00:39:37.854311 systemd[1]: Reached target basic.target. May 13 00:39:37.856380 systemd[1]: Starting systemd-fsck-root.service... May 13 00:39:37.866735 systemd-fsck[775]: ROOT: clean, 619/553520 files, 56022/553472 blocks May 13 00:39:37.870684 systemd[1]: Finished systemd-fsck-root.service. May 13 00:39:37.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.872240 systemd[1]: Mounting sysroot.mount... May 13 00:39:37.877344 systemd[1]: Mounted sysroot.mount. May 13 00:39:37.878589 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:39:37.878140 systemd[1]: Reached target initrd-root-fs.target. May 13 00:39:37.880652 systemd[1]: Mounting sysroot-usr.mount... May 13 00:39:37.881471 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:39:37.881538 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:39:37.881561 systemd[1]: Reached target ignition-diskful.target. May 13 00:39:37.883222 systemd[1]: Mounted sysroot-usr.mount. May 13 00:39:37.885042 systemd[1]: Starting initrd-setup-root.service... May 13 00:39:37.889185 initrd-setup-root[785]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:39:37.893960 initrd-setup-root[793]: cut: /sysroot/etc/group: No such file or directory May 13 00:39:37.897739 initrd-setup-root[801]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:39:37.901666 initrd-setup-root[809]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:39:37.928468 systemd[1]: Finished initrd-setup-root.service. May 13 00:39:37.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.930068 systemd[1]: Starting ignition-mount.service... May 13 00:39:37.931365 systemd[1]: Starting sysroot-boot.service... May 13 00:39:37.935844 bash[826]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:39:37.944415 ignition[828]: INFO : Ignition 2.14.0 May 13 00:39:37.944415 ignition[828]: INFO : Stage: mount May 13 00:39:37.945982 ignition[828]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:39:37.945982 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:37.945982 ignition[828]: INFO : mount: mount passed May 13 00:39:37.945982 ignition[828]: INFO : Ignition finished successfully May 13 00:39:37.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:37.947204 systemd[1]: Finished ignition-mount.service. May 13 00:39:37.953541 systemd[1]: Finished sysroot-boot.service. May 13 00:39:37.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:38.590677 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:39:38.596583 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (837) May 13 00:39:38.598905 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 13 00:39:38.598927 kernel: BTRFS info (device vda6): using free space tree May 13 00:39:38.598936 kernel: BTRFS info (device vda6): has skinny extents May 13 00:39:38.601684 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:39:38.603312 systemd[1]: Starting ignition-files.service... May 13 00:39:38.616958 ignition[857]: INFO : Ignition 2.14.0 May 13 00:39:38.616958 ignition[857]: INFO : Stage: files May 13 00:39:38.618486 ignition[857]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:39:38.618486 ignition[857]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:38.618486 ignition[857]: DEBUG : files: compiled without relabeling support, skipping May 13 00:39:38.622140 ignition[857]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:39:38.622140 ignition[857]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:39:38.625024 ignition[857]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:39:38.625024 ignition[857]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:39:38.625024 ignition[857]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:39:38.624624 unknown[857]: wrote ssh authorized keys file for user: core May 13 00:39:38.630361 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 13 00:39:38.630361 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-arm64.tar.gz: attempt #1 May 13 00:39:38.677062 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 13 00:39:38.898717 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 13 00:39:38.898717 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 13 00:39:38.902322 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-arm64.raw: attempt #1 May 13 00:39:39.217300 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 13 00:39:39.542636 systemd-networkd[740]: eth0: Gained IPv6LL May 13 00:39:39.573588 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 13 00:39:39.573588 ignition[857]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 13 00:39:39.577268 ignition[857]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:39:39.577268 ignition[857]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:39:39.577268 ignition[857]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 13 00:39:39.577268 ignition[857]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 13 00:39:39.577268 ignition[857]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:39:39.577268 ignition[857]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:39:39.577268 ignition[857]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 13 00:39:39.577268 ignition[857]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 13 00:39:39.577268 ignition[857]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 13 00:39:39.577268 ignition[857]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:39:39.577268 ignition[857]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:39:39.614799 ignition[857]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:39:39.616394 ignition[857]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:39:39.616394 ignition[857]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:39:39.616394 ignition[857]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:39:39.616394 ignition[857]: INFO : files: files passed May 13 00:39:39.616394 ignition[857]: INFO : Ignition finished successfully May 13 00:39:39.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.616316 systemd[1]: Finished ignition-files.service. May 13 00:39:39.618064 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:39:39.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.619234 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:39:39.629855 initrd-setup-root-after-ignition[882]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 13 00:39:39.619885 systemd[1]: Starting ignition-quench.service... May 13 00:39:39.632521 initrd-setup-root-after-ignition[884]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:39:39.622662 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:39:39.622742 systemd[1]: Finished ignition-quench.service. May 13 00:39:39.625615 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:39:39.626744 systemd[1]: Reached target ignition-complete.target. May 13 00:39:39.628806 systemd[1]: Starting initrd-parse-etc.service... May 13 00:39:39.641477 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:39:39.641579 systemd[1]: Finished initrd-parse-etc.service. May 13 00:39:39.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.643192 systemd[1]: Reached target initrd-fs.target. May 13 00:39:39.644305 systemd[1]: Reached target initrd.target. May 13 00:39:39.645538 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:39:39.646247 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:39:39.656455 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:39:39.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.658029 systemd[1]: Starting initrd-cleanup.service... May 13 00:39:39.665953 systemd[1]: Stopped target nss-lookup.target. May 13 00:39:39.666802 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:39:39.668175 systemd[1]: Stopped target timers.target. May 13 00:39:39.669410 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:39:39.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.669538 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:39:39.670857 systemd[1]: Stopped target initrd.target. May 13 00:39:39.672140 systemd[1]: Stopped target basic.target. May 13 00:39:39.673342 systemd[1]: Stopped target ignition-complete.target. May 13 00:39:39.674603 systemd[1]: Stopped target ignition-diskful.target. May 13 00:39:39.675910 systemd[1]: Stopped target initrd-root-device.target. May 13 00:39:39.677317 systemd[1]: Stopped target remote-fs.target. May 13 00:39:39.678603 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:39:39.679982 systemd[1]: Stopped target sysinit.target. May 13 00:39:39.681180 systemd[1]: Stopped target local-fs.target. May 13 00:39:39.682387 systemd[1]: Stopped target local-fs-pre.target. May 13 00:39:39.683622 systemd[1]: Stopped target swap.target. May 13 00:39:39.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.684799 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:39:39.684909 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:39:39.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.686208 systemd[1]: Stopped target cryptsetup.target. May 13 00:39:39.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.687260 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:39:39.687361 systemd[1]: Stopped dracut-initqueue.service. May 13 00:39:39.688765 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:39:39.688861 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:39:39.690060 systemd[1]: Stopped target paths.target. May 13 00:39:39.691235 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:39:39.694528 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:39:39.695978 systemd[1]: Stopped target slices.target. May 13 00:39:39.697405 systemd[1]: Stopped target sockets.target. May 13 00:39:39.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.698705 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:39:39.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.698817 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:39:39.703663 iscsid[747]: iscsid shutting down. May 13 00:39:39.700081 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:39:39.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.700186 systemd[1]: Stopped ignition-files.service. May 13 00:39:39.702131 systemd[1]: Stopping ignition-mount.service... May 13 00:39:39.708888 ignition[897]: INFO : Ignition 2.14.0 May 13 00:39:39.708888 ignition[897]: INFO : Stage: umount May 13 00:39:39.708888 ignition[897]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:39:39.708888 ignition[897]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:39.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.703624 systemd[1]: Stopping iscsid.service... May 13 00:39:39.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.714823 ignition[897]: INFO : umount: umount passed May 13 00:39:39.714823 ignition[897]: INFO : Ignition finished successfully May 13 00:39:39.704200 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:39:39.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.704321 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:39:39.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.706245 systemd[1]: Stopping sysroot-boot.service... May 13 00:39:39.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.706909 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:39:39.707035 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:39:39.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.708316 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:39:39.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.708405 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:39:39.710879 systemd[1]: iscsid.service: Deactivated successfully. May 13 00:39:39.710968 systemd[1]: Stopped iscsid.service. May 13 00:39:39.712713 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:39:39.712785 systemd[1]: Stopped ignition-mount.service. May 13 00:39:39.714989 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:39:39.715482 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:39:39.715574 systemd[1]: Closed iscsid.socket. May 13 00:39:39.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.716332 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:39:39.716374 systemd[1]: Stopped ignition-disks.service. May 13 00:39:39.717782 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:39:39.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.717828 systemd[1]: Stopped ignition-kargs.service. May 13 00:39:39.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.719233 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:39:39.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.719274 systemd[1]: Stopped ignition-setup.service. May 13 00:39:39.720627 systemd[1]: Stopping iscsiuio.service... May 13 00:39:39.721956 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:39:39.722036 systemd[1]: Finished initrd-cleanup.service. May 13 00:39:39.723625 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:39:39.723707 systemd[1]: Stopped iscsiuio.service. May 13 00:39:39.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.725380 systemd[1]: Stopped target network.target. May 13 00:39:39.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.727196 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:39:39.727231 systemd[1]: Closed iscsiuio.socket. May 13 00:39:39.754000 audit: BPF prog-id=6 op=UNLOAD May 13 00:39:39.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.728648 systemd[1]: Stopping systemd-networkd.service... May 13 00:39:39.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.730680 systemd[1]: Stopping systemd-resolved.service... May 13 00:39:39.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.732524 systemd-networkd[740]: eth0: DHCPv6 lease lost May 13 00:39:39.758000 audit: BPF prog-id=9 op=UNLOAD May 13 00:39:39.734289 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:39:39.734381 systemd[1]: Stopped systemd-networkd.service. May 13 00:39:39.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.736088 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:39:39.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.736128 systemd[1]: Closed systemd-networkd.socket. May 13 00:39:39.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.738459 systemd[1]: Stopping network-cleanup.service... May 13 00:39:39.740026 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:39:39.740087 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:39:39.741538 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:39:39.741579 systemd[1]: Stopped systemd-sysctl.service. May 13 00:39:39.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.743774 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:39:39.743815 systemd[1]: Stopped systemd-modules-load.service. May 13 00:39:39.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.744791 systemd[1]: Stopping systemd-udevd.service... May 13 00:39:39.750345 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:39:39.750806 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:39:39.750894 systemd[1]: Stopped systemd-resolved.service. May 13 00:39:39.752125 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:39:39.752200 systemd[1]: Stopped sysroot-boot.service. May 13 00:39:39.753656 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:39:39.753702 systemd[1]: Stopped initrd-setup-root.service. May 13 00:39:39.755326 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:39:39.755402 systemd[1]: Stopped network-cleanup.service. May 13 00:39:39.757579 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:39:39.757692 systemd[1]: Stopped systemd-udevd.service. May 13 00:39:39.758882 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:39:39.758913 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:39:39.759976 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:39:39.760004 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:39:39.761218 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:39:39.761261 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:39:39.762718 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:39:39.762757 systemd[1]: Stopped dracut-cmdline.service. May 13 00:39:39.763950 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:39:39.763987 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:39:39.765994 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:39:39.767312 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:39:39.767371 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:39:39.771057 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:39:39.771137 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:39:39.772876 systemd[1]: Reached target initrd-switch-root.target. May 13 00:39:39.798628 systemd-journald[289]: Received SIGTERM from PID 1 (n/a). May 13 00:39:39.774827 systemd[1]: Starting initrd-switch-root.service... May 13 00:39:39.780746 systemd[1]: Switching root. May 13 00:39:39.799914 systemd-journald[289]: Journal stopped May 13 00:39:41.795822 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:39:41.795870 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:39:41.795883 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:39:41.795893 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:39:41.795902 kernel: SELinux: policy capability open_perms=1 May 13 00:39:41.795912 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:39:41.795921 kernel: SELinux: policy capability always_check_network=0 May 13 00:39:41.795930 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:39:41.795939 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:39:41.795952 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:39:41.795964 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:39:41.795975 systemd[1]: Successfully loaded SELinux policy in 32.753ms. May 13 00:39:41.795998 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.907ms. May 13 00:39:41.796009 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:39:41.796020 systemd[1]: Detected virtualization kvm. May 13 00:39:41.796030 systemd[1]: Detected architecture arm64. May 13 00:39:41.796040 systemd[1]: Detected first boot. May 13 00:39:41.796050 systemd[1]: Initializing machine ID from VM UUID. May 13 00:39:41.796061 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:39:41.796075 systemd[1]: Populated /etc with preset unit settings. May 13 00:39:41.796095 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:39:41.796108 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:39:41.796120 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:39:41.796146 kernel: kauditd_printk_skb: 79 callbacks suppressed May 13 00:39:41.796159 kernel: audit: type=1334 audit(1747096781.657:83): prog-id=12 op=LOAD May 13 00:39:41.796169 kernel: audit: type=1334 audit(1747096781.657:84): prog-id=3 op=UNLOAD May 13 00:39:41.796179 kernel: audit: type=1334 audit(1747096781.659:85): prog-id=13 op=LOAD May 13 00:39:41.796188 kernel: audit: type=1334 audit(1747096781.660:86): prog-id=14 op=LOAD May 13 00:39:41.796198 kernel: audit: type=1334 audit(1747096781.660:87): prog-id=4 op=UNLOAD May 13 00:39:41.796209 kernel: audit: type=1334 audit(1747096781.660:88): prog-id=5 op=UNLOAD May 13 00:39:41.796219 kernel: audit: type=1334 audit(1747096781.661:89): prog-id=15 op=LOAD May 13 00:39:41.796230 kernel: audit: type=1334 audit(1747096781.661:90): prog-id=12 op=UNLOAD May 13 00:39:41.796241 kernel: audit: type=1334 audit(1747096781.663:91): prog-id=16 op=LOAD May 13 00:39:41.796252 kernel: audit: type=1334 audit(1747096781.664:92): prog-id=17 op=LOAD May 13 00:39:41.796264 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 00:39:41.796274 systemd[1]: Stopped initrd-switch-root.service. May 13 00:39:41.796284 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 00:39:41.796294 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:39:41.796304 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:39:41.796314 systemd[1]: Created slice system-getty.slice. May 13 00:39:41.796325 systemd[1]: Created slice system-modprobe.slice. May 13 00:39:41.796337 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:39:41.796348 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:39:41.796359 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:39:41.796370 systemd[1]: Created slice user.slice. May 13 00:39:41.796381 systemd[1]: Started systemd-ask-password-console.path. May 13 00:39:41.796392 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:39:41.796402 systemd[1]: Set up automount boot.automount. May 13 00:39:41.796418 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:39:41.796429 systemd[1]: Stopped target initrd-switch-root.target. May 13 00:39:41.796438 systemd[1]: Stopped target initrd-fs.target. May 13 00:39:41.796449 systemd[1]: Stopped target initrd-root-fs.target. May 13 00:39:41.796460 systemd[1]: Reached target integritysetup.target. May 13 00:39:41.796470 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:39:41.796481 systemd[1]: Reached target remote-fs.target. May 13 00:39:41.796541 systemd[1]: Reached target slices.target. May 13 00:39:41.796554 systemd[1]: Reached target swap.target. May 13 00:39:41.796565 systemd[1]: Reached target torcx.target. May 13 00:39:41.796577 systemd[1]: Reached target veritysetup.target. May 13 00:39:41.796587 systemd[1]: Listening on systemd-coredump.socket. May 13 00:39:41.796598 systemd[1]: Listening on systemd-initctl.socket. May 13 00:39:41.796608 systemd[1]: Listening on systemd-networkd.socket. May 13 00:39:41.796619 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:39:41.796630 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:39:41.796640 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:39:41.796650 systemd[1]: Mounting dev-hugepages.mount... May 13 00:39:41.796661 systemd[1]: Mounting dev-mqueue.mount... May 13 00:39:41.796677 systemd[1]: Mounting media.mount... May 13 00:39:41.796687 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:39:41.796698 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:39:41.796708 systemd[1]: Mounting tmp.mount... May 13 00:39:41.796719 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:39:41.796729 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:39:41.796739 systemd[1]: Starting kmod-static-nodes.service... May 13 00:39:41.796750 systemd[1]: Starting modprobe@configfs.service... May 13 00:39:41.796760 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:39:41.796771 systemd[1]: Starting modprobe@drm.service... May 13 00:39:41.796782 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:39:41.796792 systemd[1]: Starting modprobe@fuse.service... May 13 00:39:41.796802 systemd[1]: Starting modprobe@loop.service... May 13 00:39:41.796812 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:39:41.796823 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 00:39:41.796833 systemd[1]: Stopped systemd-fsck-root.service. May 13 00:39:41.796843 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 00:39:41.796853 systemd[1]: Stopped systemd-fsck-usr.service. May 13 00:39:41.796864 systemd[1]: Stopped systemd-journald.service. May 13 00:39:41.796874 systemd[1]: Starting systemd-journald.service... May 13 00:39:41.796884 kernel: fuse: init (API version 7.34) May 13 00:39:41.796895 systemd[1]: Starting systemd-modules-load.service... May 13 00:39:41.796905 systemd[1]: Starting systemd-network-generator.service... May 13 00:39:41.796915 systemd[1]: Starting systemd-remount-fs.service... May 13 00:39:41.796925 kernel: loop: module loaded May 13 00:39:41.796934 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:39:41.796944 systemd[1]: verity-setup.service: Deactivated successfully. May 13 00:39:41.796954 systemd[1]: Stopped verity-setup.service. May 13 00:39:41.796967 systemd-journald[988]: Journal started May 13 00:39:41.797012 systemd-journald[988]: Runtime Journal (/run/log/journal/e5d4b9cf88294d6db9b8102dca182dc8) is 6.0M, max 48.7M, 42.6M free. May 13 00:39:39.856000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:39:39.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:39:39.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:39:39.942000 audit: BPF prog-id=10 op=LOAD May 13 00:39:39.942000 audit: BPF prog-id=10 op=UNLOAD May 13 00:39:39.942000 audit: BPF prog-id=11 op=LOAD May 13 00:39:39.942000 audit: BPF prog-id=11 op=UNLOAD May 13 00:39:39.980000 audit[930]: AVC avc: denied { associate } for pid=930 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:39:39.980000 audit[930]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=913 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:39.980000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:39:39.981000 audit[930]: AVC avc: denied { associate } for pid=930 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:39:39.981000 audit[930]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5975 a2=1ed a3=0 items=2 ppid=913 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:39.981000 audit: CWD cwd="/" May 13 00:39:39.981000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:39.981000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:39.981000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:39:41.657000 audit: BPF prog-id=12 op=LOAD May 13 00:39:41.657000 audit: BPF prog-id=3 op=UNLOAD May 13 00:39:41.659000 audit: BPF prog-id=13 op=LOAD May 13 00:39:41.660000 audit: BPF prog-id=14 op=LOAD May 13 00:39:41.660000 audit: BPF prog-id=4 op=UNLOAD May 13 00:39:41.660000 audit: BPF prog-id=5 op=UNLOAD May 13 00:39:41.661000 audit: BPF prog-id=15 op=LOAD May 13 00:39:41.661000 audit: BPF prog-id=12 op=UNLOAD May 13 00:39:41.663000 audit: BPF prog-id=16 op=LOAD May 13 00:39:41.664000 audit: BPF prog-id=17 op=LOAD May 13 00:39:41.664000 audit: BPF prog-id=13 op=UNLOAD May 13 00:39:41.664000 audit: BPF prog-id=14 op=UNLOAD May 13 00:39:41.664000 audit: BPF prog-id=18 op=LOAD May 13 00:39:41.664000 audit: BPF prog-id=15 op=UNLOAD May 13 00:39:41.665000 audit: BPF prog-id=19 op=LOAD May 13 00:39:41.665000 audit: BPF prog-id=20 op=LOAD May 13 00:39:41.665000 audit: BPF prog-id=16 op=UNLOAD May 13 00:39:41.665000 audit: BPF prog-id=17 op=UNLOAD May 13 00:39:41.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.677000 audit: BPF prog-id=18 op=UNLOAD May 13 00:39:41.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.775000 audit: BPF prog-id=21 op=LOAD May 13 00:39:41.775000 audit: BPF prog-id=22 op=LOAD May 13 00:39:41.775000 audit: BPF prog-id=23 op=LOAD May 13 00:39:41.775000 audit: BPF prog-id=19 op=UNLOAD May 13 00:39:41.775000 audit: BPF prog-id=20 op=UNLOAD May 13 00:39:41.794000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:39:41.794000 audit[988]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffff48bf10 a2=4000 a3=1 items=0 ppid=1 pid=988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:41.794000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:39:41.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.656450 systemd[1]: Queued start job for default target multi-user.target. May 13 00:39:39.979132 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:39:41.656462 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 00:39:39.979386 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:39:41.666550 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 00:39:39.979406 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:39:39.979435 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 00:39:39.979444 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 00:39:39.979474 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 00:39:39.979486 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 00:39:39.979701 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 00:39:39.979736 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:39:41.798983 systemd[1]: Started systemd-journald.service. May 13 00:39:39.979748 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:39:39.980485 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 00:39:41.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:39.980534 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 00:39:39.980554 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 00:39:39.980567 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 00:39:39.980584 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 00:39:41.799463 systemd[1]: Mounted dev-hugepages.mount. May 13 00:39:39.980597 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 00:39:41.416615 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:39:41.416872 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:39:41.416963 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:39:41.417135 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:39:41.417183 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 00:39:41.417238 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-13T00:39:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 00:39:41.800539 systemd[1]: Mounted dev-mqueue.mount. May 13 00:39:41.801351 systemd[1]: Mounted media.mount. May 13 00:39:41.802123 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:39:41.802938 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:39:41.803778 systemd[1]: Mounted tmp.mount. May 13 00:39:41.806717 systemd[1]: Finished kmod-static-nodes.service. May 13 00:39:41.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.807760 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:39:41.808212 systemd[1]: Finished modprobe@configfs.service. May 13 00:39:41.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.809261 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:39:41.809423 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:39:41.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.810478 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:39:41.810615 systemd[1]: Finished modprobe@drm.service. May 13 00:39:41.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.811674 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:39:41.811818 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:39:41.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.812948 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:39:41.813110 systemd[1]: Finished modprobe@fuse.service. May 13 00:39:41.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.814119 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:39:41.814277 systemd[1]: Finished modprobe@loop.service. May 13 00:39:41.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.815380 systemd[1]: Finished systemd-modules-load.service. May 13 00:39:41.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.816509 systemd[1]: Finished systemd-network-generator.service. May 13 00:39:41.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.817657 systemd[1]: Finished systemd-remount-fs.service. May 13 00:39:41.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.818828 systemd[1]: Reached target network-pre.target. May 13 00:39:41.820776 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:39:41.822441 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:39:41.823339 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:39:41.824789 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:39:41.826469 systemd[1]: Starting systemd-journal-flush.service... May 13 00:39:41.827339 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:39:41.828274 systemd[1]: Starting systemd-random-seed.service... May 13 00:39:41.829212 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:39:41.830425 systemd[1]: Starting systemd-sysctl.service... May 13 00:39:41.835481 systemd-journald[988]: Time spent on flushing to /var/log/journal/e5d4b9cf88294d6db9b8102dca182dc8 is 15.595ms for 996 entries. May 13 00:39:41.835481 systemd-journald[988]: System Journal (/var/log/journal/e5d4b9cf88294d6db9b8102dca182dc8) is 8.0M, max 195.6M, 187.6M free. May 13 00:39:41.863565 systemd-journald[988]: Received client request to flush runtime journal. May 13 00:39:41.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.835421 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:39:41.838255 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:39:41.839360 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:39:41.841334 systemd[1]: Starting systemd-sysusers.service... May 13 00:39:41.847789 systemd[1]: Finished systemd-sysctl.service. May 13 00:39:41.849352 systemd[1]: Finished systemd-random-seed.service. May 13 00:39:41.850324 systemd[1]: Reached target first-boot-complete.target. May 13 00:39:41.857046 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:39:41.859265 systemd[1]: Starting systemd-udev-settle.service... May 13 00:39:41.864584 systemd[1]: Finished systemd-journal-flush.service. May 13 00:39:41.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.868465 systemd[1]: Finished systemd-sysusers.service. May 13 00:39:41.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.869694 udevadm[1031]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 13 00:39:42.226180 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:39:42.228386 systemd[1]: Starting systemd-udevd.service... May 13 00:39:42.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.227000 audit: BPF prog-id=24 op=LOAD May 13 00:39:42.227000 audit: BPF prog-id=25 op=LOAD May 13 00:39:42.227000 audit: BPF prog-id=7 op=UNLOAD May 13 00:39:42.227000 audit: BPF prog-id=8 op=UNLOAD May 13 00:39:42.246737 systemd-udevd[1033]: Using default interface naming scheme 'v252'. May 13 00:39:42.259666 systemd[1]: Started systemd-udevd.service. May 13 00:39:42.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.262000 audit: BPF prog-id=26 op=LOAD May 13 00:39:42.265033 systemd[1]: Starting systemd-networkd.service... May 13 00:39:42.269000 audit: BPF prog-id=27 op=LOAD May 13 00:39:42.269000 audit: BPF prog-id=28 op=LOAD May 13 00:39:42.269000 audit: BPF prog-id=29 op=LOAD May 13 00:39:42.270581 systemd[1]: Starting systemd-userdbd.service... May 13 00:39:42.285659 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 13 00:39:42.303487 systemd[1]: Started systemd-userdbd.service. May 13 00:39:42.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.321894 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:39:42.356482 systemd-networkd[1045]: lo: Link UP May 13 00:39:42.356507 systemd-networkd[1045]: lo: Gained carrier May 13 00:39:42.356848 systemd-networkd[1045]: Enumeration completed May 13 00:39:42.356953 systemd[1]: Started systemd-networkd.service. May 13 00:39:42.356954 systemd-networkd[1045]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:39:42.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.360066 systemd-networkd[1045]: eth0: Link UP May 13 00:39:42.360085 systemd-networkd[1045]: eth0: Gained carrier May 13 00:39:42.360852 systemd[1]: Finished systemd-udev-settle.service. May 13 00:39:42.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.362856 systemd[1]: Starting lvm2-activation-early.service... May 13 00:39:42.373071 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:39:42.386625 systemd-networkd[1045]: eth0: DHCPv4 address 10.0.0.136/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:39:42.404352 systemd[1]: Finished lvm2-activation-early.service. May 13 00:39:42.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.405380 systemd[1]: Reached target cryptsetup.target. May 13 00:39:42.407326 systemd[1]: Starting lvm2-activation.service... May 13 00:39:42.410823 lvm[1067]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:39:42.442462 systemd[1]: Finished lvm2-activation.service. May 13 00:39:42.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.443425 systemd[1]: Reached target local-fs-pre.target. May 13 00:39:42.444281 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:39:42.444314 systemd[1]: Reached target local-fs.target. May 13 00:39:42.445073 systemd[1]: Reached target machines.target. May 13 00:39:42.447075 systemd[1]: Starting ldconfig.service... May 13 00:39:42.448105 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:39:42.448160 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:42.449200 systemd[1]: Starting systemd-boot-update.service... May 13 00:39:42.451019 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:39:42.453259 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:39:42.455922 systemd[1]: Starting systemd-sysext.service... May 13 00:39:42.457064 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1069 (bootctl) May 13 00:39:42.458384 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:39:42.459951 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:39:42.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.475589 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:39:42.482044 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:39:42.482244 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:39:42.530487 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:39:42.531594 kernel: loop0: detected capacity change from 0 to 201592 May 13 00:39:42.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.542517 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:39:42.550913 systemd-fsck[1079]: fsck.fat 4.2 (2021-01-31) May 13 00:39:42.550913 systemd-fsck[1079]: /dev/vda1: 236 files, 117310/258078 clusters May 13 00:39:42.553252 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:39:42.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.562527 kernel: loop1: detected capacity change from 0 to 201592 May 13 00:39:42.570532 (sd-sysext)[1083]: Using extensions 'kubernetes'. May 13 00:39:42.570894 (sd-sysext)[1083]: Merged extensions into '/usr'. May 13 00:39:42.588387 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:39:42.589946 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:39:42.592043 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:39:42.594183 systemd[1]: Starting modprobe@loop.service... May 13 00:39:42.595007 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:39:42.595153 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:42.596028 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:39:42.596170 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:39:42.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.597504 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:39:42.597622 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:39:42.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.598827 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:39:42.598976 systemd[1]: Finished modprobe@loop.service. May 13 00:39:42.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.600534 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:39:42.600717 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:39:42.643732 ldconfig[1068]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:39:42.648606 systemd[1]: Finished ldconfig.service. May 13 00:39:42.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.797339 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:39:42.799040 systemd[1]: Mounting boot.mount... May 13 00:39:42.800847 systemd[1]: Mounting usr-share-oem.mount... May 13 00:39:42.806520 systemd[1]: Mounted boot.mount. May 13 00:39:42.807407 systemd[1]: Mounted usr-share-oem.mount. May 13 00:39:42.809276 systemd[1]: Finished systemd-sysext.service. May 13 00:39:42.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.811945 systemd[1]: Starting ensure-sysext.service... May 13 00:39:42.813681 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:39:42.814776 systemd[1]: Finished systemd-boot-update.service. May 13 00:39:42.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.818700 systemd[1]: Reloading. May 13 00:39:42.825187 systemd-tmpfiles[1091]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:39:42.827288 systemd-tmpfiles[1091]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:39:42.830123 systemd-tmpfiles[1091]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:39:42.859568 /usr/lib/systemd/system-generators/torcx-generator[1111]: time="2025-05-13T00:39:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:39:42.859889 /usr/lib/systemd/system-generators/torcx-generator[1111]: time="2025-05-13T00:39:42Z" level=info msg="torcx already run" May 13 00:39:42.911114 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:39:42.911133 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:39:42.926174 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:39:42.967000 audit: BPF prog-id=30 op=LOAD May 13 00:39:42.967000 audit: BPF prog-id=27 op=UNLOAD May 13 00:39:42.967000 audit: BPF prog-id=31 op=LOAD May 13 00:39:42.967000 audit: BPF prog-id=32 op=LOAD May 13 00:39:42.967000 audit: BPF prog-id=28 op=UNLOAD May 13 00:39:42.967000 audit: BPF prog-id=29 op=UNLOAD May 13 00:39:42.968000 audit: BPF prog-id=33 op=LOAD May 13 00:39:42.968000 audit: BPF prog-id=26 op=UNLOAD May 13 00:39:42.970000 audit: BPF prog-id=34 op=LOAD May 13 00:39:42.970000 audit: BPF prog-id=21 op=UNLOAD May 13 00:39:42.970000 audit: BPF prog-id=35 op=LOAD May 13 00:39:42.970000 audit: BPF prog-id=36 op=LOAD May 13 00:39:42.970000 audit: BPF prog-id=22 op=UNLOAD May 13 00:39:42.970000 audit: BPF prog-id=23 op=UNLOAD May 13 00:39:42.970000 audit: BPF prog-id=37 op=LOAD May 13 00:39:42.970000 audit: BPF prog-id=38 op=LOAD May 13 00:39:42.970000 audit: BPF prog-id=24 op=UNLOAD May 13 00:39:42.970000 audit: BPF prog-id=25 op=UNLOAD May 13 00:39:42.973246 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:39:42.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.977301 systemd[1]: Starting audit-rules.service... May 13 00:39:42.979061 systemd[1]: Starting clean-ca-certificates.service... May 13 00:39:42.980916 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:39:42.982000 audit: BPF prog-id=39 op=LOAD May 13 00:39:42.986601 systemd[1]: Starting systemd-resolved.service... May 13 00:39:42.987000 audit: BPF prog-id=40 op=LOAD May 13 00:39:42.989275 systemd[1]: Starting systemd-timesyncd.service... May 13 00:39:42.991123 systemd[1]: Starting systemd-update-utmp.service... May 13 00:39:42.992413 systemd[1]: Finished clean-ca-certificates.service. May 13 00:39:42.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:42.995234 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:39:42.996000 audit[1156]: SYSTEM_BOOT pid=1156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:39:42.999410 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:39:43.000707 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:39:43.003571 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:39:43.005533 systemd[1]: Starting modprobe@loop.service... May 13 00:39:43.006243 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:39:43.006404 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:43.006601 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:39:43.007702 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:39:43.007835 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:39:43.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.009284 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:39:43.009389 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:39:43.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.010841 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:39:43.010941 systemd[1]: Finished modprobe@loop.service. May 13 00:39:43.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.012190 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:39:43.012311 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:39:43.013699 systemd[1]: Finished systemd-update-utmp.service. May 13 00:39:43.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.015691 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:39:43.016882 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:39:43.019010 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:39:43.022224 systemd[1]: Starting modprobe@loop.service... May 13 00:39:43.023027 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:39:43.023165 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:43.023260 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:39:43.024071 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:39:43.025568 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:39:43.025673 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:39:43.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.026800 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:39:43.026909 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:39:43.028073 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:39:43.028195 systemd[1]: Finished modprobe@loop.service. May 13 00:39:43.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.031226 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:39:43.032405 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:39:43.034286 systemd[1]: Starting modprobe@drm.service... May 13 00:39:43.036101 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:39:43.038091 systemd[1]: Starting modprobe@loop.service... May 13 00:39:43.038911 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:39:43.039051 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:43.040389 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:39:43.044033 systemd[1]: Starting systemd-update-done.service... May 13 00:39:43.045002 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:39:43.046129 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:39:43.046259 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:39:43.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.047469 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:39:43.047609 systemd[1]: Finished modprobe@drm.service. May 13 00:39:43.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.048723 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:39:43.048833 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:39:43.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:43.049967 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:39:43.050074 systemd[1]: Finished modprobe@loop.service. May 13 00:39:43.049000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:39:43.049000 audit[1180]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe5cd2730 a2=420 a3=0 items=0 ppid=1150 pid=1180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:43.049000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:39:43.050849 augenrules[1180]: No rules May 13 00:39:43.051230 systemd[1]: Finished systemd-update-done.service. May 13 00:39:43.052451 systemd[1]: Finished audit-rules.service. May 13 00:39:43.053803 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:39:43.053870 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:39:43.054990 systemd[1]: Finished ensure-sysext.service. May 13 00:39:43.059694 systemd-resolved[1154]: Positive Trust Anchors: May 13 00:39:43.059705 systemd-resolved[1154]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:39:43.059732 systemd-resolved[1154]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:39:43.064164 systemd[1]: Started systemd-timesyncd.service. May 13 00:39:43.065126 systemd-timesyncd[1155]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 13 00:39:43.065503 systemd-timesyncd[1155]: Initial clock synchronization to Tue 2025-05-13 00:39:42.681475 UTC. May 13 00:39:43.065531 systemd[1]: Reached target time-set.target. May 13 00:39:43.072232 systemd-resolved[1154]: Defaulting to hostname 'linux'. May 13 00:39:43.073607 systemd[1]: Started systemd-resolved.service. May 13 00:39:43.074401 systemd[1]: Reached target network.target. May 13 00:39:43.075206 systemd[1]: Reached target nss-lookup.target. May 13 00:39:43.075948 systemd[1]: Reached target sysinit.target. May 13 00:39:43.076734 systemd[1]: Started motdgen.path. May 13 00:39:43.077407 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:39:43.078609 systemd[1]: Started logrotate.timer. May 13 00:39:43.079390 systemd[1]: Started mdadm.timer. May 13 00:39:43.080063 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:39:43.080892 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:39:43.080925 systemd[1]: Reached target paths.target. May 13 00:39:43.081607 systemd[1]: Reached target timers.target. May 13 00:39:43.082599 systemd[1]: Listening on dbus.socket. May 13 00:39:43.084295 systemd[1]: Starting docker.socket... May 13 00:39:43.087387 systemd[1]: Listening on sshd.socket. May 13 00:39:43.088260 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:43.088679 systemd[1]: Listening on docker.socket. May 13 00:39:43.089476 systemd[1]: Reached target sockets.target. May 13 00:39:43.090215 systemd[1]: Reached target basic.target. May 13 00:39:43.090957 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:39:43.090991 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:39:43.091903 systemd[1]: Starting containerd.service... May 13 00:39:43.093552 systemd[1]: Starting dbus.service... May 13 00:39:43.095124 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:39:43.096970 systemd[1]: Starting extend-filesystems.service... May 13 00:39:43.097892 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:39:43.099275 systemd[1]: Starting motdgen.service... May 13 00:39:43.101295 systemd[1]: Starting prepare-helm.service... May 13 00:39:43.103140 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:39:43.107136 jq[1193]: false May 13 00:39:43.107390 systemd[1]: Starting sshd-keygen.service... May 13 00:39:43.110246 systemd[1]: Starting systemd-logind.service... May 13 00:39:43.110986 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:43.111067 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:39:43.111464 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 00:39:43.112315 systemd[1]: Starting update-engine.service... May 13 00:39:43.114349 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:39:43.118804 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:39:43.118969 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:39:43.119731 jq[1207]: true May 13 00:39:43.120567 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:39:43.120728 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:39:43.121886 extend-filesystems[1194]: Found loop1 May 13 00:39:43.126554 extend-filesystems[1194]: Found vda May 13 00:39:43.127873 jq[1214]: true May 13 00:39:43.128153 extend-filesystems[1194]: Found vda1 May 13 00:39:43.129587 tar[1211]: linux-arm64/LICENSE May 13 00:39:43.129587 tar[1211]: linux-arm64/helm May 13 00:39:43.129969 extend-filesystems[1194]: Found vda2 May 13 00:39:43.130750 extend-filesystems[1194]: Found vda3 May 13 00:39:43.131472 extend-filesystems[1194]: Found usr May 13 00:39:43.132223 extend-filesystems[1194]: Found vda4 May 13 00:39:43.133686 extend-filesystems[1194]: Found vda6 May 13 00:39:43.135682 extend-filesystems[1194]: Found vda7 May 13 00:39:43.137522 extend-filesystems[1194]: Found vda9 May 13 00:39:43.137522 extend-filesystems[1194]: Checking size of /dev/vda9 May 13 00:39:43.145628 extend-filesystems[1194]: Resized partition /dev/vda9 May 13 00:39:43.153005 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:39:43.153251 systemd[1]: Finished motdgen.service. May 13 00:39:43.167305 extend-filesystems[1235]: resize2fs 1.46.5 (30-Dec-2021) May 13 00:39:43.178514 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 13 00:39:43.185537 dbus-daemon[1192]: [system] SELinux support is enabled May 13 00:39:43.185902 systemd[1]: Started dbus.service. May 13 00:39:43.202929 update_engine[1206]: I0513 00:39:43.196977 1206 main.cc:92] Flatcar Update Engine starting May 13 00:39:43.202929 update_engine[1206]: I0513 00:39:43.200831 1206 update_check_scheduler.cc:74] Next update check in 6m54s May 13 00:39:43.188544 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:39:43.188564 systemd[1]: Reached target system-config.target. May 13 00:39:43.189868 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:39:43.189883 systemd[1]: Reached target user-config.target. May 13 00:39:43.200686 systemd[1]: Started update-engine.service. May 13 00:39:43.203541 systemd[1]: Started locksmithd.service. May 13 00:39:43.206670 systemd-logind[1204]: Watching system buttons on /dev/input/event0 (Power Button) May 13 00:39:43.207096 systemd-logind[1204]: New seat seat0. May 13 00:39:43.209535 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 13 00:39:43.213575 systemd[1]: Started systemd-logind.service. May 13 00:39:43.226430 extend-filesystems[1235]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 00:39:43.226430 extend-filesystems[1235]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 00:39:43.226430 extend-filesystems[1235]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 13 00:39:43.231402 extend-filesystems[1194]: Resized filesystem in /dev/vda9 May 13 00:39:43.232271 bash[1243]: Updated "/home/core/.ssh/authorized_keys" May 13 00:39:43.228429 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:39:43.228611 systemd[1]: Finished extend-filesystems.service. May 13 00:39:43.232018 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:39:43.244047 env[1216]: time="2025-05-13T00:39:43.243999680Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:39:43.263680 env[1216]: time="2025-05-13T00:39:43.263642440Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:39:43.264026 env[1216]: time="2025-05-13T00:39:43.263999480Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:39:43.266157 env[1216]: time="2025-05-13T00:39:43.266119400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:39:43.266208 env[1216]: time="2025-05-13T00:39:43.266184920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:39:43.266576 env[1216]: time="2025-05-13T00:39:43.266548360Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:39:43.266609 env[1216]: time="2025-05-13T00:39:43.266575880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:39:43.266609 env[1216]: time="2025-05-13T00:39:43.266589560Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:39:43.266609 env[1216]: time="2025-05-13T00:39:43.266600040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:39:43.266696 env[1216]: time="2025-05-13T00:39:43.266678040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:39:43.267197 env[1216]: time="2025-05-13T00:39:43.267172480Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:39:43.267348 env[1216]: time="2025-05-13T00:39:43.267325040Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:39:43.267378 env[1216]: time="2025-05-13T00:39:43.267346400Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:39:43.267433 env[1216]: time="2025-05-13T00:39:43.267414400Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:39:43.267433 env[1216]: time="2025-05-13T00:39:43.267430440Z" level=info msg="metadata content store policy set" policy=shared May 13 00:39:43.270707 env[1216]: time="2025-05-13T00:39:43.270678920Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:39:43.270748 env[1216]: time="2025-05-13T00:39:43.270713840Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:39:43.270748 env[1216]: time="2025-05-13T00:39:43.270728360Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:39:43.270791 env[1216]: time="2025-05-13T00:39:43.270757440Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:39:43.270791 env[1216]: time="2025-05-13T00:39:43.270780600Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:39:43.270828 env[1216]: time="2025-05-13T00:39:43.270795280Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:39:43.270848 env[1216]: time="2025-05-13T00:39:43.270830480Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:39:43.271343 env[1216]: time="2025-05-13T00:39:43.271309920Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:39:43.271378 env[1216]: time="2025-05-13T00:39:43.271349000Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:39:43.271378 env[1216]: time="2025-05-13T00:39:43.271363760Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:39:43.271416 env[1216]: time="2025-05-13T00:39:43.271399880Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:39:43.271436 env[1216]: time="2025-05-13T00:39:43.271414600Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:39:43.271685 env[1216]: time="2025-05-13T00:39:43.271661760Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:39:43.271794 env[1216]: time="2025-05-13T00:39:43.271776160Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:39:43.272257 env[1216]: time="2025-05-13T00:39:43.272233520Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:39:43.272289 env[1216]: time="2025-05-13T00:39:43.272269480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:39:43.272289 env[1216]: time="2025-05-13T00:39:43.272283600Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:39:43.272477 env[1216]: time="2025-05-13T00:39:43.272457000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:39:43.272524 env[1216]: time="2025-05-13T00:39:43.272479480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:39:43.272568 env[1216]: time="2025-05-13T00:39:43.272550680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:39:43.272595 env[1216]: time="2025-05-13T00:39:43.272570440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:39:43.272595 env[1216]: time="2025-05-13T00:39:43.272584480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:39:43.272634 env[1216]: time="2025-05-13T00:39:43.272596680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:39:43.272634 env[1216]: time="2025-05-13T00:39:43.272609040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:39:43.272634 env[1216]: time="2025-05-13T00:39:43.272625480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:39:43.272693 env[1216]: time="2025-05-13T00:39:43.272639480Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:39:43.272959 env[1216]: time="2025-05-13T00:39:43.272936240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:39:43.273008 env[1216]: time="2025-05-13T00:39:43.272962400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:39:43.273040 env[1216]: time="2025-05-13T00:39:43.273016440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:39:43.273040 env[1216]: time="2025-05-13T00:39:43.273030400Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:39:43.273090 env[1216]: time="2025-05-13T00:39:43.273046560Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:39:43.273090 env[1216]: time="2025-05-13T00:39:43.273058320Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:39:43.273090 env[1216]: time="2025-05-13T00:39:43.273086040Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:39:43.273158 env[1216]: time="2025-05-13T00:39:43.273119800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:39:43.273358 env[1216]: time="2025-05-13T00:39:43.273307240Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:39:43.274034 env[1216]: time="2025-05-13T00:39:43.273363440Z" level=info msg="Connect containerd service" May 13 00:39:43.274034 env[1216]: time="2025-05-13T00:39:43.273394920Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:39:43.275277 env[1216]: time="2025-05-13T00:39:43.275237880Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:39:43.275517 env[1216]: time="2025-05-13T00:39:43.275472120Z" level=info msg="Start subscribing containerd event" May 13 00:39:43.275547 env[1216]: time="2025-05-13T00:39:43.275538320Z" level=info msg="Start recovering state" May 13 00:39:43.275624 env[1216]: time="2025-05-13T00:39:43.275608840Z" level=info msg="Start event monitor" May 13 00:39:43.275657 env[1216]: time="2025-05-13T00:39:43.275646120Z" level=info msg="Start snapshots syncer" May 13 00:39:43.275690 env[1216]: time="2025-05-13T00:39:43.275662120Z" level=info msg="Start cni network conf syncer for default" May 13 00:39:43.275690 env[1216]: time="2025-05-13T00:39:43.275671640Z" level=info msg="Start streaming server" May 13 00:39:43.275730 env[1216]: time="2025-05-13T00:39:43.275698720Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:39:43.275775 env[1216]: time="2025-05-13T00:39:43.275755880Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:39:43.275888 systemd[1]: Started containerd.service. May 13 00:39:43.276961 env[1216]: time="2025-05-13T00:39:43.276935120Z" level=info msg="containerd successfully booted in 0.033574s" May 13 00:39:43.280877 locksmithd[1244]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:39:43.510698 systemd-networkd[1045]: eth0: Gained IPv6LL May 13 00:39:43.512572 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:39:43.513807 systemd[1]: Reached target network-online.target. May 13 00:39:43.516152 systemd[1]: Starting kubelet.service... May 13 00:39:43.562806 tar[1211]: linux-arm64/README.md May 13 00:39:43.567278 systemd[1]: Finished prepare-helm.service. May 13 00:39:43.824623 sshd_keygen[1210]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:39:43.842919 systemd[1]: Finished sshd-keygen.service. May 13 00:39:43.845227 systemd[1]: Starting issuegen.service... May 13 00:39:43.849772 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:39:43.849923 systemd[1]: Finished issuegen.service. May 13 00:39:43.852047 systemd[1]: Starting systemd-user-sessions.service... May 13 00:39:43.860127 systemd[1]: Finished systemd-user-sessions.service. May 13 00:39:43.862337 systemd[1]: Started getty@tty1.service. May 13 00:39:43.864352 systemd[1]: Started serial-getty@ttyAMA0.service. May 13 00:39:43.865588 systemd[1]: Reached target getty.target. May 13 00:39:44.078174 systemd[1]: Started kubelet.service. May 13 00:39:44.079343 systemd[1]: Reached target multi-user.target. May 13 00:39:44.081358 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:39:44.088083 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:39:44.088256 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:39:44.089330 systemd[1]: Startup finished in 604ms (kernel) + 4.248s (initrd) + 4.269s (userspace) = 9.121s. May 13 00:39:44.474709 kubelet[1273]: E0513 00:39:44.474653 1273 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:39:44.476361 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:39:44.476498 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:39:48.387893 systemd[1]: Created slice system-sshd.slice. May 13 00:39:48.390010 systemd[1]: Started sshd@0-10.0.0.136:22-10.0.0.1:40240.service. May 13 00:39:48.441061 sshd[1282]: Accepted publickey for core from 10.0.0.1 port 40240 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:39:48.443412 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:48.466043 systemd-logind[1204]: New session 1 of user core. May 13 00:39:48.467613 systemd[1]: Created slice user-500.slice. May 13 00:39:48.468834 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:39:48.483430 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:39:48.484786 systemd[1]: Starting user@500.service... May 13 00:39:48.487569 (systemd)[1285]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:48.557660 systemd[1285]: Queued start job for default target default.target. May 13 00:39:48.558119 systemd[1285]: Reached target paths.target. May 13 00:39:48.558150 systemd[1285]: Reached target sockets.target. May 13 00:39:48.558160 systemd[1285]: Reached target timers.target. May 13 00:39:48.558178 systemd[1285]: Reached target basic.target. May 13 00:39:48.558218 systemd[1285]: Reached target default.target. May 13 00:39:48.558241 systemd[1285]: Startup finished in 64ms. May 13 00:39:48.558370 systemd[1]: Started user@500.service. May 13 00:39:48.559309 systemd[1]: Started session-1.scope. May 13 00:39:48.618284 systemd[1]: Started sshd@1-10.0.0.136:22-10.0.0.1:40246.service. May 13 00:39:48.656789 sshd[1294]: Accepted publickey for core from 10.0.0.1 port 40246 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:39:48.658325 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:48.661846 systemd-logind[1204]: New session 2 of user core. May 13 00:39:48.662872 systemd[1]: Started session-2.scope. May 13 00:39:48.716044 sshd[1294]: pam_unix(sshd:session): session closed for user core May 13 00:39:48.721113 systemd[1]: Started sshd@2-10.0.0.136:22-10.0.0.1:40252.service. May 13 00:39:48.722288 systemd[1]: sshd@1-10.0.0.136:22-10.0.0.1:40246.service: Deactivated successfully. May 13 00:39:48.723861 systemd-logind[1204]: Session 2 logged out. Waiting for processes to exit. May 13 00:39:48.724097 systemd[1]: session-2.scope: Deactivated successfully. May 13 00:39:48.725081 systemd-logind[1204]: Removed session 2. May 13 00:39:48.760869 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 40252 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:39:48.762205 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:48.767008 systemd[1]: Started session-3.scope. May 13 00:39:48.767460 systemd-logind[1204]: New session 3 of user core. May 13 00:39:48.819963 sshd[1299]: pam_unix(sshd:session): session closed for user core May 13 00:39:48.823453 systemd[1]: Started sshd@3-10.0.0.136:22-10.0.0.1:40262.service. May 13 00:39:48.823925 systemd[1]: sshd@2-10.0.0.136:22-10.0.0.1:40252.service: Deactivated successfully. May 13 00:39:48.824477 systemd[1]: session-3.scope: Deactivated successfully. May 13 00:39:48.827588 systemd-logind[1204]: Session 3 logged out. Waiting for processes to exit. May 13 00:39:48.828548 systemd-logind[1204]: Removed session 3. May 13 00:39:48.860038 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 40262 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:39:48.861099 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:48.864737 systemd-logind[1204]: New session 4 of user core. May 13 00:39:48.865107 systemd[1]: Started session-4.scope. May 13 00:39:48.921247 sshd[1305]: pam_unix(sshd:session): session closed for user core May 13 00:39:48.924966 systemd[1]: sshd@3-10.0.0.136:22-10.0.0.1:40262.service: Deactivated successfully. May 13 00:39:48.925574 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:39:48.926163 systemd-logind[1204]: Session 4 logged out. Waiting for processes to exit. May 13 00:39:48.927025 systemd[1]: Started sshd@4-10.0.0.136:22-10.0.0.1:40272.service. May 13 00:39:48.927696 systemd-logind[1204]: Removed session 4. May 13 00:39:48.964191 sshd[1313]: Accepted publickey for core from 10.0.0.1 port 40272 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:39:48.964719 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:48.968290 systemd-logind[1204]: New session 5 of user core. May 13 00:39:48.968891 systemd[1]: Started session-5.scope. May 13 00:39:49.034943 sudo[1316]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:39:49.035575 sudo[1316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:39:49.058804 dbus-daemon[1192]: avc: received setenforce notice (enforcing=1) May 13 00:39:49.059049 sudo[1316]: pam_unix(sudo:session): session closed for user root May 13 00:39:49.060995 sshd[1313]: pam_unix(sshd:session): session closed for user core May 13 00:39:49.064104 systemd[1]: sshd@4-10.0.0.136:22-10.0.0.1:40272.service: Deactivated successfully. May 13 00:39:49.064650 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:39:49.065927 systemd-logind[1204]: Session 5 logged out. Waiting for processes to exit. May 13 00:39:49.066982 systemd[1]: Started sshd@5-10.0.0.136:22-10.0.0.1:40288.service. May 13 00:39:49.067569 systemd-logind[1204]: Removed session 5. May 13 00:39:49.104771 sshd[1320]: Accepted publickey for core from 10.0.0.1 port 40288 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:39:49.106327 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:49.109617 systemd-logind[1204]: New session 6 of user core. May 13 00:39:49.110387 systemd[1]: Started session-6.scope. May 13 00:39:49.160912 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:39:49.161127 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:39:49.163742 sudo[1324]: pam_unix(sudo:session): session closed for user root May 13 00:39:49.167928 sudo[1323]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:39:49.168175 sudo[1323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:39:49.176206 systemd[1]: Stopping audit-rules.service... May 13 00:39:49.175000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:39:49.177613 auditctl[1327]: No rules May 13 00:39:49.178510 kernel: kauditd_printk_skb: 121 callbacks suppressed May 13 00:39:49.178563 kernel: audit: type=1305 audit(1747096789.175:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:39:49.177994 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:39:49.178137 systemd[1]: Stopped audit-rules.service. May 13 00:39:49.179478 systemd[1]: Starting audit-rules.service... May 13 00:39:49.175000 audit[1327]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe133cd10 a2=420 a3=0 items=0 ppid=1 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.182933 kernel: audit: type=1300 audit(1747096789.175:210): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe133cd10 a2=420 a3=0 items=0 ppid=1 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.182978 kernel: audit: type=1327 audit(1747096789.175:210): proctitle=2F7362696E2F617564697463746C002D44 May 13 00:39:49.175000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:39:49.184513 kernel: audit: type=1131 audit(1747096789.176:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:49.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:49.194184 augenrules[1344]: No rules May 13 00:39:49.195019 systemd[1]: Finished audit-rules.service. May 13 00:39:49.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:49.196124 sudo[1323]: pam_unix(sudo:session): session closed for user root May 13 00:39:49.195000 audit[1323]: USER_END pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:49.200754 kernel: audit: type=1130 audit(1747096789.194:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:49.200821 kernel: audit: type=1106 audit(1747096789.195:213): pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:49.200840 kernel: audit: type=1104 audit(1747096789.195:214): pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:49.195000 audit[1323]: CRED_DISP pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:49.200311 sshd[1320]: pam_unix(sshd:session): session closed for user core May 13 00:39:49.200000 audit[1320]: USER_END pid=1320 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:49.203443 systemd[1]: Started sshd@6-10.0.0.136:22-10.0.0.1:40290.service. May 13 00:39:49.203983 systemd[1]: sshd@5-10.0.0.136:22-10.0.0.1:40288.service: Deactivated successfully. May 13 00:39:49.204626 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:39:49.205116 systemd-logind[1204]: Session 6 logged out. Waiting for processes to exit. May 13 00:39:49.205979 systemd-logind[1204]: Removed session 6. May 13 00:39:49.206500 kernel: audit: type=1106 audit(1747096789.200:215): pid=1320 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:49.206542 kernel: audit: type=1104 audit(1747096789.200:216): pid=1320 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:49.200000 audit[1320]: CRED_DISP pid=1320 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:49.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.136:22-10.0.0.1:40290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:49.211734 kernel: audit: type=1130 audit(1747096789.203:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.136:22-10.0.0.1:40290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:49.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.136:22-10.0.0.1:40288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:49.240000 audit[1349]: USER_ACCT pid=1349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:49.241685 sshd[1349]: Accepted publickey for core from 10.0.0.1 port 40290 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:39:49.242000 audit[1349]: CRED_ACQ pid=1349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:49.242000 audit[1349]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd681fde0 a2=3 a3=1 items=0 ppid=1 pid=1349 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.242000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:49.243221 sshd[1349]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:49.246948 systemd-logind[1204]: New session 7 of user core. May 13 00:39:49.247322 systemd[1]: Started session-7.scope. May 13 00:39:49.250000 audit[1349]: USER_START pid=1349 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:49.250000 audit[1352]: CRED_ACQ pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:49.297000 audit[1353]: USER_ACCT pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:49.298977 sudo[1353]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:39:49.297000 audit[1353]: CRED_REFR pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:49.299187 sudo[1353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:39:49.299000 audit[1353]: USER_START pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:49.374048 systemd[1]: Starting docker.service... May 13 00:39:49.453355 env[1365]: time="2025-05-13T00:39:49.453237384Z" level=info msg="Starting up" May 13 00:39:49.455438 env[1365]: time="2025-05-13T00:39:49.455413522Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:39:49.455550 env[1365]: time="2025-05-13T00:39:49.455536541Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:39:49.455633 env[1365]: time="2025-05-13T00:39:49.455616212Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:39:49.455685 env[1365]: time="2025-05-13T00:39:49.455672825Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:39:49.460570 env[1365]: time="2025-05-13T00:39:49.460540469Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:39:49.460570 env[1365]: time="2025-05-13T00:39:49.460563411Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:39:49.460682 env[1365]: time="2025-05-13T00:39:49.460578900Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:39:49.460682 env[1365]: time="2025-05-13T00:39:49.460590839Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:39:49.464752 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2791029816-merged.mount: Deactivated successfully. May 13 00:39:49.557426 env[1365]: time="2025-05-13T00:39:49.557386805Z" level=info msg="Loading containers: start." May 13 00:39:49.606000 audit[1399]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.606000 audit[1399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff9858790 a2=0 a3=1 items=0 ppid=1365 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.606000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 00:39:49.607000 audit[1401]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.607000 audit[1401]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffe94cfa70 a2=0 a3=1 items=0 ppid=1365 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.607000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 00:39:49.609000 audit[1403]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.609000 audit[1403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd2410b80 a2=0 a3=1 items=0 ppid=1365 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.609000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:39:49.610000 audit[1405]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.610000 audit[1405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffec75fe40 a2=0 a3=1 items=0 ppid=1365 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.610000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:39:49.613000 audit[1407]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.613000 audit[1407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe5a51640 a2=0 a3=1 items=0 ppid=1365 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.613000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 13 00:39:49.649000 audit[1412]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.649000 audit[1412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe6e3c3c0 a2=0 a3=1 items=0 ppid=1365 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.649000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 13 00:39:49.660000 audit[1414]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.660000 audit[1414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff7eb6b90 a2=0 a3=1 items=0 ppid=1365 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.660000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 13 00:39:49.662000 audit[1416]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.662000 audit[1416]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffdda098b0 a2=0 a3=1 items=0 ppid=1365 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.662000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 13 00:39:49.664000 audit[1418]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.664000 audit[1418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffcba74e00 a2=0 a3=1 items=0 ppid=1365 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.664000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:39:49.672000 audit[1422]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.672000 audit[1422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe8bfb1e0 a2=0 a3=1 items=0 ppid=1365 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.672000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:39:49.682000 audit[1423]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.682000 audit[1423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd44aa160 a2=0 a3=1 items=0 ppid=1365 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.682000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:39:49.692845 kernel: Initializing XFRM netlink socket May 13 00:39:49.719844 env[1365]: time="2025-05-13T00:39:49.719746593Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 13 00:39:49.732000 audit[1431]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.732000 audit[1431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc37b5200 a2=0 a3=1 items=0 ppid=1365 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.732000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 13 00:39:49.744000 audit[1434]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.744000 audit[1434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc44ca4f0 a2=0 a3=1 items=0 ppid=1365 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.744000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 13 00:39:49.748000 audit[1437]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.748000 audit[1437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff30c89e0 a2=0 a3=1 items=0 ppid=1365 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 13 00:39:49.749000 audit[1439]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.749000 audit[1439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd22522f0 a2=0 a3=1 items=0 ppid=1365 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 13 00:39:49.751000 audit[1441]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.751000 audit[1441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffc63fbfd0 a2=0 a3=1 items=0 ppid=1365 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 13 00:39:49.753000 audit[1443]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.753000 audit[1443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd8d47020 a2=0 a3=1 items=0 ppid=1365 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.753000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 13 00:39:49.755000 audit[1445]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.755000 audit[1445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffffc894ce0 a2=0 a3=1 items=0 ppid=1365 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 13 00:39:49.764000 audit[1448]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.764000 audit[1448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffd3804a80 a2=0 a3=1 items=0 ppid=1365 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.764000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 13 00:39:49.766000 audit[1450]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.766000 audit[1450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc4450020 a2=0 a3=1 items=0 ppid=1365 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.766000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:39:49.767000 audit[1452]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.767000 audit[1452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe0220610 a2=0 a3=1 items=0 ppid=1365 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:39:49.768000 audit[1454]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.768000 audit[1454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc04a4490 a2=0 a3=1 items=0 ppid=1365 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 13 00:39:49.770741 systemd-networkd[1045]: docker0: Link UP May 13 00:39:49.777000 audit[1458]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.777000 audit[1458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffc6b3520 a2=0 a3=1 items=0 ppid=1365 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.777000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:39:49.790000 audit[1459]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:49.790000 audit[1459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd2cc71f0 a2=0 a3=1 items=0 ppid=1365 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:49.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:39:49.790869 env[1365]: time="2025-05-13T00:39:49.790829556Z" level=info msg="Loading containers: done." May 13 00:39:49.812604 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck842048827-merged.mount: Deactivated successfully. May 13 00:39:49.817792 env[1365]: time="2025-05-13T00:39:49.817736031Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 13 00:39:49.817940 env[1365]: time="2025-05-13T00:39:49.817915272Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 13 00:39:49.818033 env[1365]: time="2025-05-13T00:39:49.818014374Z" level=info msg="Daemon has completed initialization" May 13 00:39:49.832359 systemd[1]: Started docker.service. May 13 00:39:49.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:49.839328 env[1365]: time="2025-05-13T00:39:49.839209084Z" level=info msg="API listen on /run/docker.sock" May 13 00:39:50.470158 env[1216]: time="2025-05-13T00:39:50.470116627Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 13 00:39:51.075590 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1369258999.mount: Deactivated successfully. May 13 00:39:52.674199 env[1216]: time="2025-05-13T00:39:52.674153002Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:52.676352 env[1216]: time="2025-05-13T00:39:52.676318687Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab579d62aa850c7d0eca948aad11fcf813743e3b6c9742241c32cb4f1638968b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:52.678812 env[1216]: time="2025-05-13T00:39:52.678778014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:52.680496 env[1216]: time="2025-05-13T00:39:52.680451268Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:52.681162 env[1216]: time="2025-05-13T00:39:52.681129153Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:ab579d62aa850c7d0eca948aad11fcf813743e3b6c9742241c32cb4f1638968b\"" May 13 00:39:52.682138 env[1216]: time="2025-05-13T00:39:52.682109768Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 13 00:39:54.617919 env[1216]: time="2025-05-13T00:39:54.617870950Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:54.622209 env[1216]: time="2025-05-13T00:39:54.622155263Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79534fade29d07745acc698bbf598b0604a9ea1fd7917822c816a74fc0b55965,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:54.624559 env[1216]: time="2025-05-13T00:39:54.624524834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:54.626052 env[1216]: time="2025-05-13T00:39:54.626018317Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:54.626935 env[1216]: time="2025-05-13T00:39:54.626904003Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:79534fade29d07745acc698bbf598b0604a9ea1fd7917822c816a74fc0b55965\"" May 13 00:39:54.627721 env[1216]: time="2025-05-13T00:39:54.627694032Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 13 00:39:54.670623 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 00:39:54.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:54.670782 systemd[1]: Stopped kubelet.service. May 13 00:39:54.671707 kernel: kauditd_printk_skb: 84 callbacks suppressed May 13 00:39:54.671760 kernel: audit: type=1130 audit(1747096794.669:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:54.672343 systemd[1]: Starting kubelet.service... May 13 00:39:54.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:54.677161 kernel: audit: type=1131 audit(1747096794.669:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:54.765801 systemd[1]: Started kubelet.service. May 13 00:39:54.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:54.775020 kernel: audit: type=1130 audit(1747096794.764:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:54.817951 kubelet[1501]: E0513 00:39:54.817896 1501 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:39:54.820393 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:39:54.820536 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:39:54.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:39:54.824516 kernel: audit: type=1131 audit(1747096794.820:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:39:56.341783 env[1216]: time="2025-05-13T00:39:56.341722610Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:56.342906 env[1216]: time="2025-05-13T00:39:56.342865506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:730fbc2590716b8202fcdd928a813b847575ebf03911a059979257cd6cbb8245,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:56.345222 env[1216]: time="2025-05-13T00:39:56.345188138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:56.346822 env[1216]: time="2025-05-13T00:39:56.346789524Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:56.347711 env[1216]: time="2025-05-13T00:39:56.347668632Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:730fbc2590716b8202fcdd928a813b847575ebf03911a059979257cd6cbb8245\"" May 13 00:39:56.349032 env[1216]: time="2025-05-13T00:39:56.348998861Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 13 00:39:57.392988 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount27758318.mount: Deactivated successfully. May 13 00:39:57.849839 env[1216]: time="2025-05-13T00:39:57.849781617Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:57.852846 env[1216]: time="2025-05-13T00:39:57.852805688Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:57.854067 env[1216]: time="2025-05-13T00:39:57.854030966Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:57.855240 env[1216]: time="2025-05-13T00:39:57.855212458Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:57.855816 env[1216]: time="2025-05-13T00:39:57.855784940Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7\"" May 13 00:39:57.856330 env[1216]: time="2025-05-13T00:39:57.856308478Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 13 00:39:58.415398 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2540044979.mount: Deactivated successfully. May 13 00:39:59.663836 env[1216]: time="2025-05-13T00:39:59.663787100Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:59.665480 env[1216]: time="2025-05-13T00:39:59.665443554Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:59.667234 env[1216]: time="2025-05-13T00:39:59.667210012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:59.669581 env[1216]: time="2025-05-13T00:39:59.669552321Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:59.670361 env[1216]: time="2025-05-13T00:39:59.670326321Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4\"" May 13 00:39:59.671419 env[1216]: time="2025-05-13T00:39:59.671394844Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 13 00:40:00.143404 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2654971648.mount: Deactivated successfully. May 13 00:40:00.148295 env[1216]: time="2025-05-13T00:40:00.148241831Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:00.149845 env[1216]: time="2025-05-13T00:40:00.149819331Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:00.151278 env[1216]: time="2025-05-13T00:40:00.151250305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:00.152660 env[1216]: time="2025-05-13T00:40:00.152631999Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:00.153104 env[1216]: time="2025-05-13T00:40:00.153078657Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 13 00:40:00.153580 env[1216]: time="2025-05-13T00:40:00.153555741Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 13 00:40:00.717523 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1611191387.mount: Deactivated successfully. May 13 00:40:03.575254 env[1216]: time="2025-05-13T00:40:03.575183607Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:03.580150 env[1216]: time="2025-05-13T00:40:03.580111648Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:03.584171 env[1216]: time="2025-05-13T00:40:03.584143062Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:03.587619 env[1216]: time="2025-05-13T00:40:03.587581693Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:03.587971 env[1216]: time="2025-05-13T00:40:03.587933912Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82\"" May 13 00:40:04.920599 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 00:40:04.920766 systemd[1]: Stopped kubelet.service. May 13 00:40:04.922191 systemd[1]: Starting kubelet.service... May 13 00:40:04.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:04.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:04.927259 kernel: audit: type=1130 audit(1747096804.920:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:04.927309 kernel: audit: type=1131 audit(1747096804.920:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:05.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:05.013104 systemd[1]: Started kubelet.service. May 13 00:40:05.016512 kernel: audit: type=1130 audit(1747096805.012:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:05.046511 kubelet[1533]: E0513 00:40:05.046451 1533 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:40:05.048689 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:40:05.048818 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:40:05.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:40:05.051520 kernel: audit: type=1131 audit(1747096805.047:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:40:08.424680 systemd[1]: Stopped kubelet.service. May 13 00:40:08.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:08.427041 systemd[1]: Starting kubelet.service... May 13 00:40:08.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:08.429770 kernel: audit: type=1130 audit(1747096808.423:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:08.429854 kernel: audit: type=1131 audit(1747096808.423:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:08.452888 systemd[1]: Reloading. May 13 00:40:08.507349 /usr/lib/systemd/system-generators/torcx-generator[1567]: time="2025-05-13T00:40:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:40:08.507377 /usr/lib/systemd/system-generators/torcx-generator[1567]: time="2025-05-13T00:40:08Z" level=info msg="torcx already run" May 13 00:40:08.599486 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:40:08.599519 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:40:08.614804 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:40:08.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668535 kernel: audit: type=1400 audit(1747096808.663:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668604 kernel: audit: type=1400 audit(1747096808.666:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668633 kernel: audit: type=1400 audit(1747096808.667:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.673134 kernel: audit: type=1400 audit(1747096808.667:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668000 audit: BPF prog-id=46 op=LOAD May 13 00:40:08.668000 audit: BPF prog-id=30 op=UNLOAD May 13 00:40:08.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.670000 audit: BPF prog-id=47 op=LOAD May 13 00:40:08.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.672000 audit: BPF prog-id=48 op=LOAD May 13 00:40:08.673000 audit: BPF prog-id=31 op=UNLOAD May 13 00:40:08.673000 audit: BPF prog-id=32 op=UNLOAD May 13 00:40:08.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.674000 audit: BPF prog-id=49 op=LOAD May 13 00:40:08.674000 audit: BPF prog-id=44 op=UNLOAD May 13 00:40:08.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.676000 audit: BPF prog-id=50 op=LOAD May 13 00:40:08.676000 audit: BPF prog-id=39 op=UNLOAD May 13 00:40:08.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.677000 audit: BPF prog-id=51 op=LOAD May 13 00:40:08.677000 audit: BPF prog-id=33 op=UNLOAD May 13 00:40:08.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit: BPF prog-id=52 op=LOAD May 13 00:40:08.679000 audit: BPF prog-id=41 op=UNLOAD May 13 00:40:08.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit: BPF prog-id=53 op=LOAD May 13 00:40:08.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.680000 audit: BPF prog-id=54 op=LOAD May 13 00:40:08.680000 audit: BPF prog-id=42 op=UNLOAD May 13 00:40:08.680000 audit: BPF prog-id=43 op=UNLOAD May 13 00:40:08.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.681000 audit: BPF prog-id=55 op=LOAD May 13 00:40:08.681000 audit: BPF prog-id=40 op=UNLOAD May 13 00:40:08.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.683000 audit: BPF prog-id=56 op=LOAD May 13 00:40:08.683000 audit: BPF prog-id=34 op=UNLOAD May 13 00:40:08.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit: BPF prog-id=57 op=LOAD May 13 00:40:08.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.684000 audit: BPF prog-id=58 op=LOAD May 13 00:40:08.684000 audit: BPF prog-id=35 op=UNLOAD May 13 00:40:08.684000 audit: BPF prog-id=36 op=UNLOAD May 13 00:40:08.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit: BPF prog-id=59 op=LOAD May 13 00:40:08.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:08.686000 audit: BPF prog-id=60 op=LOAD May 13 00:40:08.686000 audit: BPF prog-id=37 op=UNLOAD May 13 00:40:08.686000 audit: BPF prog-id=38 op=UNLOAD May 13 00:40:08.704911 systemd[1]: Started kubelet.service. May 13 00:40:08.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:08.710251 systemd[1]: Stopping kubelet.service... May 13 00:40:08.710986 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:40:08.711281 systemd[1]: Stopped kubelet.service. May 13 00:40:08.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:08.713532 systemd[1]: Starting kubelet.service... May 13 00:40:08.805332 systemd[1]: Started kubelet.service. May 13 00:40:08.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:08.842333 kubelet[1617]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:40:08.842696 kubelet[1617]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 13 00:40:08.842741 kubelet[1617]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:40:08.843033 kubelet[1617]: I0513 00:40:08.842995 1617 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:40:09.598721 kubelet[1617]: I0513 00:40:09.598677 1617 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 13 00:40:09.598721 kubelet[1617]: I0513 00:40:09.598710 1617 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:40:09.599001 kubelet[1617]: I0513 00:40:09.598973 1617 server.go:954] "Client rotation is on, will bootstrap in background" May 13 00:40:09.627108 kubelet[1617]: E0513 00:40:09.627054 1617 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.136:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 13 00:40:09.628053 kubelet[1617]: I0513 00:40:09.628030 1617 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:40:09.640662 kubelet[1617]: E0513 00:40:09.640606 1617 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:40:09.640662 kubelet[1617]: I0513 00:40:09.640659 1617 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:40:09.643328 kubelet[1617]: I0513 00:40:09.643294 1617 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:40:09.643579 kubelet[1617]: I0513 00:40:09.643546 1617 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:40:09.643764 kubelet[1617]: I0513 00:40:09.643575 1617 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:40:09.643843 kubelet[1617]: I0513 00:40:09.643830 1617 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:40:09.643843 kubelet[1617]: I0513 00:40:09.643838 1617 container_manager_linux.go:304] "Creating device plugin manager" May 13 00:40:09.644044 kubelet[1617]: I0513 00:40:09.644018 1617 state_mem.go:36] "Initialized new in-memory state store" May 13 00:40:09.646660 kubelet[1617]: I0513 00:40:09.646633 1617 kubelet.go:446] "Attempting to sync node with API server" May 13 00:40:09.646660 kubelet[1617]: I0513 00:40:09.646659 1617 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:40:09.646747 kubelet[1617]: I0513 00:40:09.646740 1617 kubelet.go:352] "Adding apiserver pod source" May 13 00:40:09.646770 kubelet[1617]: I0513 00:40:09.646752 1617 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:40:09.650820 kubelet[1617]: W0513 00:40:09.650776 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.136:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 13 00:40:09.650952 kubelet[1617]: E0513 00:40:09.650933 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.136:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 13 00:40:09.651103 kubelet[1617]: W0513 00:40:09.651063 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 13 00:40:09.651150 kubelet[1617]: E0513 00:40:09.651118 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 13 00:40:09.652658 kubelet[1617]: I0513 00:40:09.652611 1617 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:40:09.653346 kubelet[1617]: I0513 00:40:09.653321 1617 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:40:09.653513 kubelet[1617]: W0513 00:40:09.653501 1617 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:40:09.654560 kubelet[1617]: I0513 00:40:09.654542 1617 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 13 00:40:09.654629 kubelet[1617]: I0513 00:40:09.654580 1617 server.go:1287] "Started kubelet" May 13 00:40:09.654726 kubelet[1617]: I0513 00:40:09.654688 1617 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:40:09.655782 kubelet[1617]: I0513 00:40:09.655761 1617 server.go:490] "Adding debug handlers to kubelet server" May 13 00:40:09.657000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:09.657000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:40:09.657000 audit[1617]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c0eb10 a1=4000705b48 a2=4000c0eae0 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.657000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:40:09.658485 kubelet[1617]: I0513 00:40:09.658460 1617 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:40:09.658000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:09.658000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:40:09.658000 audit[1617]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c24160 a1=4000705b60 a2=4000c0eba0 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.658000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:40:09.658782 kubelet[1617]: I0513 00:40:09.658764 1617 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 13 00:40:09.658913 kubelet[1617]: I0513 00:40:09.658899 1617 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:40:09.659699 kubelet[1617]: I0513 00:40:09.659289 1617 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:40:09.661550 kubelet[1617]: E0513 00:40:09.661518 1617 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:40:09.661631 kubelet[1617]: I0513 00:40:09.661562 1617 volume_manager.go:297] "Starting Kubelet Volume Manager" May 13 00:40:09.661871 kubelet[1617]: I0513 00:40:09.661842 1617 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:40:09.661950 kubelet[1617]: I0513 00:40:09.661912 1617 reconciler.go:26] "Reconciler: start to sync state" May 13 00:40:09.662232 kubelet[1617]: W0513 00:40:09.662172 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.136:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 13 00:40:09.662267 kubelet[1617]: E0513 00:40:09.662254 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.136:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 13 00:40:09.662441 kubelet[1617]: I0513 00:40:09.662419 1617 factory.go:221] Registration of the systemd container factory successfully May 13 00:40:09.662517 kubelet[1617]: I0513 00:40:09.662486 1617 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:40:09.663599 kubelet[1617]: I0513 00:40:09.663582 1617 factory.go:221] Registration of the containerd container factory successfully May 13 00:40:09.663953 kubelet[1617]: I0513 00:40:09.663900 1617 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:40:09.664109 kubelet[1617]: I0513 00:40:09.664095 1617 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:40:09.664451 kubelet[1617]: E0513 00:40:09.664434 1617 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:40:09.664727 kubelet[1617]: E0513 00:40:09.664517 1617 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.136:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.136:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183eef4ab7ada0cf default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-13 00:40:09.654558927 +0000 UTC m=+0.845146619,LastTimestamp:2025-05-13 00:40:09.654558927 +0000 UTC m=+0.845146619,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 13 00:40:09.665000 audit[1630]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:09.665000 audit[1630]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffea9fb910 a2=0 a3=1 items=0 ppid=1617 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:40:09.666000 audit[1631]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:09.666000 audit[1631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff63ac580 a2=0 a3=1 items=0 ppid=1617 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:40:09.667765 kubelet[1617]: E0513 00:40:09.667729 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.136:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.136:6443: connect: connection refused" interval="200ms" May 13 00:40:09.668000 audit[1633]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:09.668000 audit[1633]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdf89daf0 a2=0 a3=1 items=0 ppid=1617 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:40:09.670000 audit[1635]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:09.670000 audit[1635]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffee33d100 a2=0 a3=1 items=0 ppid=1617 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:40:09.675010 kubelet[1617]: I0513 00:40:09.674985 1617 cpu_manager.go:221] "Starting CPU manager" policy="none" May 13 00:40:09.675010 kubelet[1617]: I0513 00:40:09.675006 1617 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 13 00:40:09.675101 kubelet[1617]: I0513 00:40:09.675024 1617 state_mem.go:36] "Initialized new in-memory state store" May 13 00:40:09.677000 audit[1644]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:09.677000 audit[1644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffcad9b030 a2=0 a3=1 items=0 ppid=1617 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:40:09.678701 kubelet[1617]: I0513 00:40:09.678668 1617 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:40:09.678000 audit[1645]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:09.678000 audit[1645]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff0337350 a2=0 a3=1 items=0 ppid=1617 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:40:09.679000 audit[1646]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:09.679000 audit[1646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe13e3760 a2=0 a3=1 items=0 ppid=1617 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:40:09.679701 kubelet[1617]: I0513 00:40:09.679584 1617 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:40:09.679701 kubelet[1617]: I0513 00:40:09.679603 1617 status_manager.go:227] "Starting to sync pod status with apiserver" May 13 00:40:09.679701 kubelet[1617]: I0513 00:40:09.679619 1617 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 13 00:40:09.679701 kubelet[1617]: I0513 00:40:09.679626 1617 kubelet.go:2388] "Starting kubelet main sync loop" May 13 00:40:09.679701 kubelet[1617]: E0513 00:40:09.679662 1617 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:40:09.680000 audit[1647]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:09.680000 audit[1647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc61fba60 a2=0 a3=1 items=0 ppid=1617 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:40:09.680000 audit[1648]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:09.680000 audit[1648]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcd547130 a2=0 a3=1 items=0 ppid=1617 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:40:09.681000 audit[1649]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:09.681000 audit[1649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffcc0e470 a2=0 a3=1 items=0 ppid=1617 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:40:09.681000 audit[1650]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:09.681000 audit[1650]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe0063810 a2=0 a3=1 items=0 ppid=1617 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:40:09.682000 audit[1651]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:09.682000 audit[1651]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc8107420 a2=0 a3=1 items=0 ppid=1617 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:40:09.762344 kubelet[1617]: E0513 00:40:09.762300 1617 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:40:09.780657 kubelet[1617]: E0513 00:40:09.780619 1617 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 13 00:40:09.807041 kubelet[1617]: W0513 00:40:09.806973 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 13 00:40:09.807041 kubelet[1617]: E0513 00:40:09.807038 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 13 00:40:09.817704 kubelet[1617]: I0513 00:40:09.817663 1617 policy_none.go:49] "None policy: Start" May 13 00:40:09.817704 kubelet[1617]: I0513 00:40:09.817701 1617 memory_manager.go:186] "Starting memorymanager" policy="None" May 13 00:40:09.817801 kubelet[1617]: I0513 00:40:09.817719 1617 state_mem.go:35] "Initializing new in-memory state store" May 13 00:40:09.824723 systemd[1]: Created slice kubepods.slice. May 13 00:40:09.828526 systemd[1]: Created slice kubepods-burstable.slice. May 13 00:40:09.830805 systemd[1]: Created slice kubepods-besteffort.slice. May 13 00:40:09.842229 kubelet[1617]: I0513 00:40:09.842206 1617 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:40:09.841000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:09.841000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:40:09.841000 audit[1617]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ee91a0 a1=4000926420 a2=4000ee9170 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:09.841000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:40:09.842607 kubelet[1617]: I0513 00:40:09.842587 1617 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:40:09.842934 kubelet[1617]: I0513 00:40:09.842918 1617 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:40:09.843049 kubelet[1617]: I0513 00:40:09.843005 1617 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:40:09.843220 kubelet[1617]: I0513 00:40:09.843193 1617 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:40:09.844853 kubelet[1617]: E0513 00:40:09.844830 1617 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 13 00:40:09.844948 kubelet[1617]: E0513 00:40:09.844876 1617 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 13 00:40:09.872654 kubelet[1617]: E0513 00:40:09.868772 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.136:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.136:6443: connect: connection refused" interval="400ms" May 13 00:40:09.944859 kubelet[1617]: I0513 00:40:09.944816 1617 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:40:09.945381 kubelet[1617]: E0513 00:40:09.945354 1617 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.136:6443/api/v1/nodes\": dial tcp 10.0.0.136:6443: connect: connection refused" node="localhost" May 13 00:40:09.987358 systemd[1]: Created slice kubepods-burstable-pod0aa656c15d53221e8345fb99bc40df58.slice. May 13 00:40:09.995209 kubelet[1617]: E0513 00:40:09.995178 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:40:09.997432 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 13 00:40:09.998605 kubelet[1617]: E0513 00:40:09.998586 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:40:10.000055 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 13 00:40:10.001224 kubelet[1617]: E0513 00:40:10.001204 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:40:10.064564 kubelet[1617]: I0513 00:40:10.064528 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:40:10.064564 kubelet[1617]: I0513 00:40:10.064568 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 13 00:40:10.064703 kubelet[1617]: I0513 00:40:10.064597 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0aa656c15d53221e8345fb99bc40df58-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"0aa656c15d53221e8345fb99bc40df58\") " pod="kube-system/kube-apiserver-localhost" May 13 00:40:10.064703 kubelet[1617]: I0513 00:40:10.064613 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:40:10.064703 kubelet[1617]: I0513 00:40:10.064627 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:40:10.064703 kubelet[1617]: I0513 00:40:10.064643 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:40:10.064703 kubelet[1617]: I0513 00:40:10.064671 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:40:10.064809 kubelet[1617]: I0513 00:40:10.064724 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0aa656c15d53221e8345fb99bc40df58-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"0aa656c15d53221e8345fb99bc40df58\") " pod="kube-system/kube-apiserver-localhost" May 13 00:40:10.064809 kubelet[1617]: I0513 00:40:10.064758 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0aa656c15d53221e8345fb99bc40df58-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"0aa656c15d53221e8345fb99bc40df58\") " pod="kube-system/kube-apiserver-localhost" May 13 00:40:10.148006 kubelet[1617]: I0513 00:40:10.147258 1617 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:40:10.148006 kubelet[1617]: E0513 00:40:10.147641 1617 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.136:6443/api/v1/nodes\": dial tcp 10.0.0.136:6443: connect: connection refused" node="localhost" May 13 00:40:10.273313 kubelet[1617]: E0513 00:40:10.273265 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.136:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.136:6443: connect: connection refused" interval="800ms" May 13 00:40:10.295656 kubelet[1617]: E0513 00:40:10.295610 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:10.296194 env[1216]: time="2025-05-13T00:40:10.296156386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:0aa656c15d53221e8345fb99bc40df58,Namespace:kube-system,Attempt:0,}" May 13 00:40:10.299773 kubelet[1617]: E0513 00:40:10.299740 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:10.300129 env[1216]: time="2025-05-13T00:40:10.300099625Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 13 00:40:10.301573 kubelet[1617]: E0513 00:40:10.301552 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:10.301903 env[1216]: time="2025-05-13T00:40:10.301865591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 13 00:40:10.549001 kubelet[1617]: I0513 00:40:10.548976 1617 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:40:10.549347 kubelet[1617]: E0513 00:40:10.549309 1617 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.136:6443/api/v1/nodes\": dial tcp 10.0.0.136:6443: connect: connection refused" node="localhost" May 13 00:40:10.784834 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1504575891.mount: Deactivated successfully. May 13 00:40:10.789612 env[1216]: time="2025-05-13T00:40:10.789573280Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.792569 env[1216]: time="2025-05-13T00:40:10.792534583Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.793840 env[1216]: time="2025-05-13T00:40:10.793808484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.794576 env[1216]: time="2025-05-13T00:40:10.794539833Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.796577 env[1216]: time="2025-05-13T00:40:10.796541408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.798231 env[1216]: time="2025-05-13T00:40:10.798195062Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.800799 env[1216]: time="2025-05-13T00:40:10.800509011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.801207 kubelet[1617]: W0513 00:40:10.801158 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 13 00:40:10.801257 kubelet[1617]: E0513 00:40:10.801218 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 13 00:40:10.803630 env[1216]: time="2025-05-13T00:40:10.803601119Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.805628 env[1216]: time="2025-05-13T00:40:10.805602894Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.805853 kubelet[1617]: W0513 00:40:10.805823 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 13 00:40:10.805909 kubelet[1617]: E0513 00:40:10.805859 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 13 00:40:10.806525 env[1216]: time="2025-05-13T00:40:10.806487455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.807220 env[1216]: time="2025-05-13T00:40:10.807200232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.808026 env[1216]: time="2025-05-13T00:40:10.807999160Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:10.832846 env[1216]: time="2025-05-13T00:40:10.832788350Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:10.832975 env[1216]: time="2025-05-13T00:40:10.832833084Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:10.833043 env[1216]: time="2025-05-13T00:40:10.833016370Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:10.833272 env[1216]: time="2025-05-13T00:40:10.833239158Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/238c22fdd9623624b577588f1dfc4135898f8d470203f6a682237aec426f09de pid=1673 runtime=io.containerd.runc.v2 May 13 00:40:10.833618 env[1216]: time="2025-05-13T00:40:10.833566110Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:10.833618 env[1216]: time="2025-05-13T00:40:10.833599301Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:10.833618 env[1216]: time="2025-05-13T00:40:10.833609366Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:10.833785 env[1216]: time="2025-05-13T00:40:10.833746162Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/91ea854fa90058b8d70a4991a2d455c6df9f8ff49110457bcbdfdf5bb31ae5ea pid=1674 runtime=io.containerd.runc.v2 May 13 00:40:10.834669 env[1216]: time="2025-05-13T00:40:10.834550602Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:10.834669 env[1216]: time="2025-05-13T00:40:10.834596454Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:10.834669 env[1216]: time="2025-05-13T00:40:10.834607158Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:10.834851 env[1216]: time="2025-05-13T00:40:10.834781618Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43b19f89711b52c6634811d644e4d739c244d8f554a7a39139a293e17a5c4bd1 pid=1675 runtime=io.containerd.runc.v2 May 13 00:40:10.845285 systemd[1]: Started cri-containerd-91ea854fa90058b8d70a4991a2d455c6df9f8ff49110457bcbdfdf5bb31ae5ea.scope. May 13 00:40:10.847929 systemd[1]: Started cri-containerd-238c22fdd9623624b577588f1dfc4135898f8d470203f6a682237aec426f09de.scope. May 13 00:40:10.848792 systemd[1]: Started cri-containerd-43b19f89711b52c6634811d644e4d739c244d8f554a7a39139a293e17a5c4bd1.scope. May 13 00:40:10.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.881428 kernel: kauditd_printk_skb: 219 callbacks suppressed May 13 00:40:10.881475 kernel: audit: type=1400 audit(1747096810.877:452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.881506 kernel: audit: type=1400 audit(1747096810.877:453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.886068 kernel: audit: type=1400 audit(1747096810.878:454): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.886112 kernel: audit: type=1400 audit(1747096810.878:455): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.890545 kernel: audit: type=1400 audit(1747096810.878:456): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.890592 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 00:40:10.890620 kernel: audit: type=1400 audit(1747096810.878:457): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.893420 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 13 00:40:10.893483 kernel: audit: type=1400 audit(1747096810.878:458): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896392 kernel: audit: backlog limit exceeded May 13 00:40:10.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.878000 audit: BPF prog-id=61 op=LOAD May 13 00:40:10.882000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1674 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931656138353466613930303538623864373061343939316132643435 May 13 00:40:10.882000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1674 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931656138353466613930303538623864373061343939316132643435 May 13 00:40:10.882000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.882000 audit: BPF prog-id=62 op=LOAD May 13 00:40:10.882000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1674 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931656138353466613930303538623864373061343939316132643435 May 13 00:40:10.883000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit: BPF prog-id=63 op=LOAD May 13 00:40:10.883000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.883000 audit: BPF prog-id=64 op=LOAD May 13 00:40:10.883000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1674 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931656138353466613930303538623864373061343939316132643435 May 13 00:40:10.885000 audit: BPF prog-id=64 op=UNLOAD May 13 00:40:10.885000 audit: BPF prog-id=62 op=UNLOAD May 13 00:40:10.885000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1673 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233386332326664643936323336323462353737353838663164666334 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.885000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1674 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.896000 audit[1697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1673 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233386332326664643936323336323462353737353838663164666334 May 13 00:40:10.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931656138353466613930303538623864373061343939316132643435 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit: BPF prog-id=66 op=LOAD May 13 00:40:10.896000 audit[1697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1673 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233386332326664643936323336323462353737353838663164666334 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit: BPF prog-id=67 op=LOAD May 13 00:40:10.896000 audit[1697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1673 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233386332326664643936323336323462353737353838663164666334 May 13 00:40:10.896000 audit: BPF prog-id=67 op=UNLOAD May 13 00:40:10.896000 audit: BPF prog-id=66 op=UNLOAD May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.896000 audit: BPF prog-id=68 op=LOAD May 13 00:40:10.896000 audit[1697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1673 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233386332326664643936323336323462353737353838663164666334 May 13 00:40:10.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit: BPF prog-id=69 op=LOAD May 13 00:40:10.898000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1675 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623139663839373131623532633636333438313164363434653464 May 13 00:40:10.898000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1675 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623139663839373131623532633636333438313164363434653464 May 13 00:40:10.898000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.898000 audit: BPF prog-id=70 op=LOAD May 13 00:40:10.898000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1675 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623139663839373131623532633636333438313164363434653464 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit: BPF prog-id=71 op=LOAD May 13 00:40:10.899000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1675 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623139663839373131623532633636333438313164363434653464 May 13 00:40:10.899000 audit: BPF prog-id=71 op=UNLOAD May 13 00:40:10.899000 audit: BPF prog-id=70 op=UNLOAD May 13 00:40:10.899000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.899000 audit: BPF prog-id=72 op=LOAD May 13 00:40:10.899000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1675 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623139663839373131623532633636333438313164363434653464 May 13 00:40:10.922185 env[1216]: time="2025-05-13T00:40:10.921772402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"238c22fdd9623624b577588f1dfc4135898f8d470203f6a682237aec426f09de\"" May 13 00:40:10.922880 env[1216]: time="2025-05-13T00:40:10.922839131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:0aa656c15d53221e8345fb99bc40df58,Namespace:kube-system,Attempt:0,} returns sandbox id \"91ea854fa90058b8d70a4991a2d455c6df9f8ff49110457bcbdfdf5bb31ae5ea\"" May 13 00:40:10.925000 kubelet[1617]: E0513 00:40:10.924959 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:10.925728 kubelet[1617]: E0513 00:40:10.925706 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:10.926110 env[1216]: time="2025-05-13T00:40:10.926067956Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"43b19f89711b52c6634811d644e4d739c244d8f554a7a39139a293e17a5c4bd1\"" May 13 00:40:10.926715 kubelet[1617]: E0513 00:40:10.926692 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:10.927907 env[1216]: time="2025-05-13T00:40:10.927876699Z" level=info msg="CreateContainer within sandbox \"91ea854fa90058b8d70a4991a2d455c6df9f8ff49110457bcbdfdf5bb31ae5ea\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 13 00:40:10.928215 env[1216]: time="2025-05-13T00:40:10.928183681Z" level=info msg="CreateContainer within sandbox \"43b19f89711b52c6634811d644e4d739c244d8f554a7a39139a293e17a5c4bd1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 13 00:40:10.929268 env[1216]: time="2025-05-13T00:40:10.929233954Z" level=info msg="CreateContainer within sandbox \"238c22fdd9623624b577588f1dfc4135898f8d470203f6a682237aec426f09de\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 13 00:40:10.944565 env[1216]: time="2025-05-13T00:40:10.944512289Z" level=info msg="CreateContainer within sandbox \"43b19f89711b52c6634811d644e4d739c244d8f554a7a39139a293e17a5c4bd1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"f41b3bb6a81c694099d1558962f284e9ef21d13f444af514d66dc0e9a603889a\"" May 13 00:40:10.945002 env[1216]: time="2025-05-13T00:40:10.944973361Z" level=info msg="StartContainer for \"f41b3bb6a81c694099d1558962f284e9ef21d13f444af514d66dc0e9a603889a\"" May 13 00:40:10.947080 env[1216]: time="2025-05-13T00:40:10.947049904Z" level=info msg="CreateContainer within sandbox \"238c22fdd9623624b577588f1dfc4135898f8d470203f6a682237aec426f09de\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"410f27634143275474c143ae651e432a103fcd7485abc70fcfdaff967ac1a50d\"" May 13 00:40:10.947444 env[1216]: time="2025-05-13T00:40:10.947414680Z" level=info msg="CreateContainer within sandbox \"91ea854fa90058b8d70a4991a2d455c6df9f8ff49110457bcbdfdf5bb31ae5ea\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"aa60eb711c2692176e303c18412576f0095e27770016cb0fe9eedd89970cb2af\"" May 13 00:40:10.947513 env[1216]: time="2025-05-13T00:40:10.947434890Z" level=info msg="StartContainer for \"410f27634143275474c143ae651e432a103fcd7485abc70fcfdaff967ac1a50d\"" May 13 00:40:10.948692 env[1216]: time="2025-05-13T00:40:10.948657866Z" level=info msg="StartContainer for \"aa60eb711c2692176e303c18412576f0095e27770016cb0fe9eedd89970cb2af\"" May 13 00:40:10.965196 systemd[1]: Started cri-containerd-410f27634143275474c143ae651e432a103fcd7485abc70fcfdaff967ac1a50d.scope. May 13 00:40:10.965978 systemd[1]: Started cri-containerd-f41b3bb6a81c694099d1558962f284e9ef21d13f444af514d66dc0e9a603889a.scope. May 13 00:40:10.990625 systemd[1]: Started cri-containerd-aa60eb711c2692176e303c18412576f0095e27770016cb0fe9eedd89970cb2af.scope. May 13 00:40:10.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:10.999000 audit: BPF prog-id=73 op=LOAD May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1673 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306632373633343134333237353437346331343361653635316534 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1673 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306632373633343134333237353437346331343361653635316534 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit: BPF prog-id=74 op=LOAD May 13 00:40:11.000000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1673 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306632373633343134333237353437346331343361653635316534 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit: BPF prog-id=75 op=LOAD May 13 00:40:11.000000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1673 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306632373633343134333237353437346331343361653635316534 May 13 00:40:11.000000 audit: BPF prog-id=75 op=UNLOAD May 13 00:40:11.000000 audit: BPF prog-id=74 op=UNLOAD May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.000000 audit: BPF prog-id=76 op=LOAD May 13 00:40:11.000000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1673 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306632373633343134333237353437346331343361653635316534 May 13 00:40:11.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit: BPF prog-id=77 op=LOAD May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634316233626236613831633639343039396431353538393632663238 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634316233626236613831633639343039396431353538393632663238 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit: BPF prog-id=78 op=LOAD May 13 00:40:11.004000 audit[1791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634316233626236613831633639343039396431353538393632663238 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit: BPF prog-id=79 op=LOAD May 13 00:40:11.004000 audit[1791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634316233626236613831633639343039396431353538393632663238 May 13 00:40:11.004000 audit: BPF prog-id=79 op=UNLOAD May 13 00:40:11.004000 audit: BPF prog-id=78 op=UNLOAD May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.004000 audit: BPF prog-id=80 op=LOAD May 13 00:40:11.004000 audit[1791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634316233626236613831633639343039396431353538393632663238 May 13 00:40:11.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit: BPF prog-id=81 op=LOAD May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1674 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161363065623731316332363932313736653330336331383431323537 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1674 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161363065623731316332363932313736653330336331383431323537 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit: BPF prog-id=82 op=LOAD May 13 00:40:11.008000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1674 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161363065623731316332363932313736653330336331383431323537 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit: BPF prog-id=83 op=LOAD May 13 00:40:11.008000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1674 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161363065623731316332363932313736653330336331383431323537 May 13 00:40:11.008000 audit: BPF prog-id=83 op=UNLOAD May 13 00:40:11.008000 audit: BPF prog-id=82 op=UNLOAD May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:11.008000 audit: BPF prog-id=84 op=LOAD May 13 00:40:11.008000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1674 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:11.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161363065623731316332363932313736653330336331383431323537 May 13 00:40:11.025270 env[1216]: time="2025-05-13T00:40:11.025227050Z" level=info msg="StartContainer for \"410f27634143275474c143ae651e432a103fcd7485abc70fcfdaff967ac1a50d\" returns successfully" May 13 00:40:11.053893 env[1216]: time="2025-05-13T00:40:11.049021685Z" level=info msg="StartContainer for \"aa60eb711c2692176e303c18412576f0095e27770016cb0fe9eedd89970cb2af\" returns successfully" May 13 00:40:11.053893 env[1216]: time="2025-05-13T00:40:11.049171130Z" level=info msg="StartContainer for \"f41b3bb6a81c694099d1558962f284e9ef21d13f444af514d66dc0e9a603889a\" returns successfully" May 13 00:40:11.078269 kubelet[1617]: E0513 00:40:11.078221 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.136:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.136:6443: connect: connection refused" interval="1.6s" May 13 00:40:11.111997 kubelet[1617]: W0513 00:40:11.111886 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.136:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 13 00:40:11.111997 kubelet[1617]: E0513 00:40:11.111953 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.136:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 13 00:40:11.350822 kubelet[1617]: I0513 00:40:11.350722 1617 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:40:11.686508 kubelet[1617]: E0513 00:40:11.686476 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:40:11.686622 kubelet[1617]: E0513 00:40:11.686614 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:11.688152 kubelet[1617]: E0513 00:40:11.688132 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:40:11.688248 kubelet[1617]: E0513 00:40:11.688231 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:11.689542 kubelet[1617]: E0513 00:40:11.689523 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:40:11.689628 kubelet[1617]: E0513 00:40:11.689612 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:12.690908 kubelet[1617]: E0513 00:40:12.690880 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:40:12.691366 kubelet[1617]: E0513 00:40:12.691349 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:12.691845 kubelet[1617]: E0513 00:40:12.691827 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:40:12.692033 kubelet[1617]: E0513 00:40:12.692016 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:12.727429 kubelet[1617]: E0513 00:40:12.727403 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:40:12.727705 kubelet[1617]: E0513 00:40:12.727688 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:12.887000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:12.887000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40030946f0 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:40:12.887000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:40:12.888000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:12.888000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=4003094750 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:40:12.888000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:40:12.889000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:12.889000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=40083f75c0 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:40:12.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:40:12.889000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:12.889000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4007bbdd40 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:40:12.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:40:12.889000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:12.889000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4007bbdd80 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:40:12.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:40:12.889000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:12.889000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=40083f7800 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:40:12.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:40:12.953930 kubelet[1617]: E0513 00:40:12.953793 1617 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 13 00:40:13.036287 kubelet[1617]: I0513 00:40:13.036253 1617 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 13 00:40:13.068221 kubelet[1617]: I0513 00:40:13.068192 1617 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 13 00:40:13.073854 kubelet[1617]: E0513 00:40:13.073826 1617 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 13 00:40:13.073854 kubelet[1617]: I0513 00:40:13.073852 1617 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 13 00:40:13.075588 kubelet[1617]: E0513 00:40:13.075565 1617 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 13 00:40:13.075588 kubelet[1617]: I0513 00:40:13.075587 1617 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 13 00:40:13.077045 kubelet[1617]: E0513 00:40:13.077025 1617 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 13 00:40:13.653087 kubelet[1617]: I0513 00:40:13.653052 1617 apiserver.go:52] "Watching apiserver" May 13 00:40:13.662556 kubelet[1617]: I0513 00:40:13.662532 1617 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:40:14.079000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:14.079000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000bb4000 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:40:14.079000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:40:14.079000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:14.079000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=400044a460 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:40:14.079000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:40:14.776299 systemd[1]: Reloading. May 13 00:40:14.829143 /usr/lib/systemd/system-generators/torcx-generator[1915]: time="2025-05-13T00:40:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:40:14.829475 /usr/lib/systemd/system-generators/torcx-generator[1915]: time="2025-05-13T00:40:14Z" level=info msg="torcx already run" May 13 00:40:14.886095 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:40:14.886113 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:40:14.901390 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:40:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit: BPF prog-id=85 op=LOAD May 13 00:40:14.958000 audit: BPF prog-id=46 op=UNLOAD May 13 00:40:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit: BPF prog-id=86 op=LOAD May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit: BPF prog-id=87 op=LOAD May 13 00:40:14.959000 audit: BPF prog-id=47 op=UNLOAD May 13 00:40:14.959000 audit: BPF prog-id=48 op=UNLOAD May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit: BPF prog-id=88 op=LOAD May 13 00:40:14.959000 audit: BPF prog-id=69 op=UNLOAD May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit: BPF prog-id=89 op=LOAD May 13 00:40:14.960000 audit: BPF prog-id=49 op=UNLOAD May 13 00:40:14.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.960000 audit: BPF prog-id=90 op=LOAD May 13 00:40:14.960000 audit: BPF prog-id=61 op=UNLOAD May 13 00:40:14.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.961000 audit: BPF prog-id=91 op=LOAD May 13 00:40:14.961000 audit: BPF prog-id=50 op=UNLOAD May 13 00:40:14.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.962000 audit: BPF prog-id=92 op=LOAD May 13 00:40:14.962000 audit: BPF prog-id=51 op=UNLOAD May 13 00:40:14.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.963000 audit: BPF prog-id=93 op=LOAD May 13 00:40:14.963000 audit: BPF prog-id=63 op=UNLOAD May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit: BPF prog-id=94 op=LOAD May 13 00:40:14.964000 audit: BPF prog-id=52 op=UNLOAD May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit: BPF prog-id=95 op=LOAD May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.964000 audit: BPF prog-id=96 op=LOAD May 13 00:40:14.964000 audit: BPF prog-id=53 op=UNLOAD May 13 00:40:14.964000 audit: BPF prog-id=54 op=UNLOAD May 13 00:40:14.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit: BPF prog-id=97 op=LOAD May 13 00:40:14.965000 audit: BPF prog-id=55 op=UNLOAD May 13 00:40:14.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.965000 audit: BPF prog-id=98 op=LOAD May 13 00:40:14.965000 audit: BPF prog-id=81 op=UNLOAD May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit: BPF prog-id=99 op=LOAD May 13 00:40:14.967000 audit: BPF prog-id=56 op=UNLOAD May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit: BPF prog-id=100 op=LOAD May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.967000 audit: BPF prog-id=101 op=LOAD May 13 00:40:14.967000 audit: BPF prog-id=57 op=UNLOAD May 13 00:40:14.967000 audit: BPF prog-id=58 op=UNLOAD May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit: BPF prog-id=102 op=LOAD May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit: BPF prog-id=103 op=LOAD May 13 00:40:14.968000 audit: BPF prog-id=59 op=UNLOAD May 13 00:40:14.968000 audit: BPF prog-id=60 op=UNLOAD May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit: BPF prog-id=104 op=LOAD May 13 00:40:14.968000 audit: BPF prog-id=73 op=UNLOAD May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:14.969000 audit: BPF prog-id=105 op=LOAD May 13 00:40:14.969000 audit: BPF prog-id=77 op=UNLOAD May 13 00:40:14.979787 systemd[1]: Stopping kubelet.service... May 13 00:40:15.008721 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:40:15.008920 systemd[1]: Stopped kubelet.service. May 13 00:40:15.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:15.008973 systemd[1]: kubelet.service: Consumed 1.185s CPU time. May 13 00:40:15.010535 systemd[1]: Starting kubelet.service... May 13 00:40:15.098318 systemd[1]: Started kubelet.service. May 13 00:40:15.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:15.135995 kubelet[1956]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:40:15.135995 kubelet[1956]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 13 00:40:15.135995 kubelet[1956]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:40:15.136339 kubelet[1956]: I0513 00:40:15.136107 1956 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:40:15.142759 kubelet[1956]: I0513 00:40:15.142717 1956 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 13 00:40:15.142759 kubelet[1956]: I0513 00:40:15.142747 1956 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:40:15.143002 kubelet[1956]: I0513 00:40:15.142975 1956 server.go:954] "Client rotation is on, will bootstrap in background" May 13 00:40:15.144164 kubelet[1956]: I0513 00:40:15.144143 1956 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 13 00:40:15.147023 kubelet[1956]: I0513 00:40:15.146989 1956 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:40:15.150185 kubelet[1956]: E0513 00:40:15.150155 1956 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:40:15.150185 kubelet[1956]: I0513 00:40:15.150184 1956 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:40:15.152728 kubelet[1956]: I0513 00:40:15.152702 1956 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:40:15.153047 kubelet[1956]: I0513 00:40:15.153004 1956 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:40:15.153303 kubelet[1956]: I0513 00:40:15.153060 1956 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:40:15.153375 kubelet[1956]: I0513 00:40:15.153305 1956 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:40:15.153375 kubelet[1956]: I0513 00:40:15.153314 1956 container_manager_linux.go:304] "Creating device plugin manager" May 13 00:40:15.153375 kubelet[1956]: I0513 00:40:15.153362 1956 state_mem.go:36] "Initialized new in-memory state store" May 13 00:40:15.153515 kubelet[1956]: I0513 00:40:15.153480 1956 kubelet.go:446] "Attempting to sync node with API server" May 13 00:40:15.153515 kubelet[1956]: I0513 00:40:15.153513 1956 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:40:15.153570 kubelet[1956]: I0513 00:40:15.153532 1956 kubelet.go:352] "Adding apiserver pod source" May 13 00:40:15.153570 kubelet[1956]: I0513 00:40:15.153540 1956 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:40:15.154097 kubelet[1956]: I0513 00:40:15.154062 1956 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:40:15.154621 kubelet[1956]: I0513 00:40:15.154598 1956 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:40:15.159055 kubelet[1956]: I0513 00:40:15.159025 1956 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 13 00:40:15.159055 kubelet[1956]: I0513 00:40:15.159058 1956 server.go:1287] "Started kubelet" May 13 00:40:15.174000 audit[1956]: AVC avc: denied { mac_admin } for pid=1956 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:15.174000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:40:15.174000 audit[1956]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007d1140 a1=4000f30de0 a2=40007d1110 a3=25 items=0 ppid=1 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.174000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:40:15.174000 audit[1956]: AVC avc: denied { mac_admin } for pid=1956 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:15.174000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:40:15.174000 audit[1956]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f25880 a1=4000f30df8 a2=40007d11d0 a3=25 items=0 ppid=1 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.174000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:40:15.176589 kubelet[1956]: I0513 00:40:15.176252 1956 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:40:15.176589 kubelet[1956]: I0513 00:40:15.176292 1956 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 13 00:40:15.176589 kubelet[1956]: I0513 00:40:15.176324 1956 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:40:15.183864 kubelet[1956]: I0513 00:40:15.183825 1956 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:40:15.184488 kubelet[1956]: E0513 00:40:15.184275 1956 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:40:15.184931 kubelet[1956]: I0513 00:40:15.184907 1956 server.go:490] "Adding debug handlers to kubelet server" May 13 00:40:15.185818 kubelet[1956]: I0513 00:40:15.185751 1956 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:40:15.186026 kubelet[1956]: I0513 00:40:15.185985 1956 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:40:15.186283 kubelet[1956]: I0513 00:40:15.186261 1956 volume_manager.go:297] "Starting Kubelet Volume Manager" May 13 00:40:15.186364 kubelet[1956]: I0513 00:40:15.186348 1956 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:40:15.186648 kubelet[1956]: I0513 00:40:15.186620 1956 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:40:15.190831 kubelet[1956]: I0513 00:40:15.190806 1956 reconciler.go:26] "Reconciler: start to sync state" May 13 00:40:15.193019 kubelet[1956]: I0513 00:40:15.192998 1956 factory.go:221] Registration of the containerd container factory successfully May 13 00:40:15.193117 kubelet[1956]: I0513 00:40:15.193105 1956 factory.go:221] Registration of the systemd container factory successfully May 13 00:40:15.193323 kubelet[1956]: I0513 00:40:15.193296 1956 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:40:15.198411 kubelet[1956]: I0513 00:40:15.198357 1956 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:40:15.199159 kubelet[1956]: I0513 00:40:15.199136 1956 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:40:15.199159 kubelet[1956]: I0513 00:40:15.199154 1956 status_manager.go:227] "Starting to sync pod status with apiserver" May 13 00:40:15.199226 kubelet[1956]: I0513 00:40:15.199170 1956 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 13 00:40:15.199226 kubelet[1956]: I0513 00:40:15.199176 1956 kubelet.go:2388] "Starting kubelet main sync loop" May 13 00:40:15.199226 kubelet[1956]: E0513 00:40:15.199214 1956 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:40:15.223560 kubelet[1956]: I0513 00:40:15.223539 1956 cpu_manager.go:221] "Starting CPU manager" policy="none" May 13 00:40:15.223560 kubelet[1956]: I0513 00:40:15.223556 1956 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 13 00:40:15.223665 kubelet[1956]: I0513 00:40:15.223575 1956 state_mem.go:36] "Initialized new in-memory state store" May 13 00:40:15.223713 kubelet[1956]: I0513 00:40:15.223697 1956 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 13 00:40:15.223747 kubelet[1956]: I0513 00:40:15.223712 1956 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 13 00:40:15.223747 kubelet[1956]: I0513 00:40:15.223735 1956 policy_none.go:49] "None policy: Start" May 13 00:40:15.223800 kubelet[1956]: I0513 00:40:15.223750 1956 memory_manager.go:186] "Starting memorymanager" policy="None" May 13 00:40:15.223800 kubelet[1956]: I0513 00:40:15.223761 1956 state_mem.go:35] "Initializing new in-memory state store" May 13 00:40:15.223858 kubelet[1956]: I0513 00:40:15.223846 1956 state_mem.go:75] "Updated machine memory state" May 13 00:40:15.227182 kubelet[1956]: I0513 00:40:15.227118 1956 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:40:15.225000 audit[1956]: AVC avc: denied { mac_admin } for pid=1956 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:15.225000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:40:15.225000 audit[1956]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007c8930 a1=4000f306a8 a2=40007c8900 a3=25 items=0 ppid=1 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.225000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:40:15.227444 kubelet[1956]: I0513 00:40:15.227211 1956 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:40:15.227444 kubelet[1956]: I0513 00:40:15.227375 1956 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:40:15.227444 kubelet[1956]: I0513 00:40:15.227387 1956 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:40:15.227619 kubelet[1956]: I0513 00:40:15.227565 1956 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:40:15.228199 kubelet[1956]: E0513 00:40:15.228181 1956 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 13 00:40:15.300670 kubelet[1956]: I0513 00:40:15.300642 1956 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 13 00:40:15.300867 kubelet[1956]: I0513 00:40:15.300695 1956 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 13 00:40:15.300949 kubelet[1956]: I0513 00:40:15.300705 1956 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 13 00:40:15.335193 kubelet[1956]: I0513 00:40:15.335156 1956 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:40:15.340716 kubelet[1956]: I0513 00:40:15.340688 1956 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 13 00:40:15.340784 kubelet[1956]: I0513 00:40:15.340749 1956 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 13 00:40:15.391795 kubelet[1956]: I0513 00:40:15.391716 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0aa656c15d53221e8345fb99bc40df58-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"0aa656c15d53221e8345fb99bc40df58\") " pod="kube-system/kube-apiserver-localhost" May 13 00:40:15.391795 kubelet[1956]: I0513 00:40:15.391749 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0aa656c15d53221e8345fb99bc40df58-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"0aa656c15d53221e8345fb99bc40df58\") " pod="kube-system/kube-apiserver-localhost" May 13 00:40:15.391795 kubelet[1956]: I0513 00:40:15.391767 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0aa656c15d53221e8345fb99bc40df58-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"0aa656c15d53221e8345fb99bc40df58\") " pod="kube-system/kube-apiserver-localhost" May 13 00:40:15.391795 kubelet[1956]: I0513 00:40:15.391784 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:40:15.391937 kubelet[1956]: I0513 00:40:15.391811 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:40:15.391937 kubelet[1956]: I0513 00:40:15.391826 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:40:15.391937 kubelet[1956]: I0513 00:40:15.391840 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:40:15.391937 kubelet[1956]: I0513 00:40:15.391855 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:40:15.391937 kubelet[1956]: I0513 00:40:15.391870 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 13 00:40:15.605387 kubelet[1956]: E0513 00:40:15.605355 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:15.607511 kubelet[1956]: E0513 00:40:15.607473 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:15.607631 kubelet[1956]: E0513 00:40:15.607544 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:16.154953 kubelet[1956]: I0513 00:40:16.154915 1956 apiserver.go:52] "Watching apiserver" May 13 00:40:16.187799 kubelet[1956]: I0513 00:40:16.187762 1956 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:40:16.211702 kubelet[1956]: E0513 00:40:16.211678 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:16.212647 kubelet[1956]: I0513 00:40:16.212625 1956 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 13 00:40:16.217230 kubelet[1956]: I0513 00:40:16.215396 1956 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 13 00:40:16.222826 kubelet[1956]: E0513 00:40:16.221677 1956 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 13 00:40:16.222826 kubelet[1956]: E0513 00:40:16.221816 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:16.222826 kubelet[1956]: E0513 00:40:16.222075 1956 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 13 00:40:16.222826 kubelet[1956]: E0513 00:40:16.222156 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:16.251279 kubelet[1956]: I0513 00:40:16.250919 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.250902303 podStartE2EDuration="1.250902303s" podCreationTimestamp="2025-05-13 00:40:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:40:16.240558215 +0000 UTC m=+1.138761564" watchObservedRunningTime="2025-05-13 00:40:16.250902303 +0000 UTC m=+1.149105652" May 13 00:40:16.251279 kubelet[1956]: I0513 00:40:16.251014 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.251010619 podStartE2EDuration="1.251010619s" podCreationTimestamp="2025-05-13 00:40:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:40:16.250902703 +0000 UTC m=+1.149106052" watchObservedRunningTime="2025-05-13 00:40:16.251010619 +0000 UTC m=+1.149213968" May 13 00:40:16.269930 kubelet[1956]: I0513 00:40:16.269513 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.269483786 podStartE2EDuration="1.269483786s" podCreationTimestamp="2025-05-13 00:40:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:40:16.262324547 +0000 UTC m=+1.160527896" watchObservedRunningTime="2025-05-13 00:40:16.269483786 +0000 UTC m=+1.167687135" May 13 00:40:17.213113 kubelet[1956]: E0513 00:40:17.213069 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:17.213113 kubelet[1956]: E0513 00:40:17.213081 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:17.214075 kubelet[1956]: E0513 00:40:17.214054 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:18.019000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:18.024362 kernel: kauditd_printk_skb: 616 callbacks suppressed May 13 00:40:18.024481 kernel: audit: type=1400 audit(1747096818.019:817): avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:18.024512 kernel: audit: type=1300 audit(1747096818.019:817): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400075db40 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:40:18.019000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400075db40 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:40:18.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:40:18.032054 kernel: audit: type=1327 audit(1747096818.019:817): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:40:18.032123 kernel: audit: type=1400 audit(1747096818.019:818): avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:18.019000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:18.019000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400075db80 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:40:18.039755 kernel: audit: type=1300 audit(1747096818.019:818): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400075db80 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:40:18.039812 kernel: audit: type=1327 audit(1747096818.019:818): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:40:18.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:40:18.019000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:18.046046 kernel: audit: type=1400 audit(1747096818.019:819): avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:18.046174 kernel: audit: type=1300 audit(1747096818.019:819): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400075dbc0 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:40:18.019000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400075dbc0 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:40:18.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:40:18.053867 kernel: audit: type=1327 audit(1747096818.019:819): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:40:18.053965 kernel: audit: type=1400 audit(1747096818.019:820): avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:18.019000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:40:18.019000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400075dc00 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:40:18.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:40:18.026000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7310 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:40:18.026000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40005e94c0 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:40:18.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:40:18.749517 kubelet[1956]: E0513 00:40:18.749462 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:19.966421 sudo[1353]: pam_unix(sudo:session): session closed for user root May 13 00:40:19.965000 audit[1353]: USER_END pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:40:19.966000 audit[1353]: CRED_DISP pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:40:19.969161 sshd[1349]: pam_unix(sshd:session): session closed for user core May 13 00:40:19.969000 audit[1349]: USER_END pid=1349 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:19.970000 audit[1349]: CRED_DISP pid=1349 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:19.972141 systemd[1]: sshd@6-10.0.0.136:22-10.0.0.1:40290.service: Deactivated successfully. May 13 00:40:19.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.136:22-10.0.0.1:40290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:19.972881 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:40:19.973033 systemd[1]: session-7.scope: Consumed 6.731s CPU time. May 13 00:40:19.973389 systemd-logind[1204]: Session 7 logged out. Waiting for processes to exit. May 13 00:40:19.974060 systemd-logind[1204]: Removed session 7. May 13 00:40:21.288364 kubelet[1956]: E0513 00:40:21.288318 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:22.219616 kubelet[1956]: E0513 00:40:22.219586 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:22.697853 kubelet[1956]: I0513 00:40:22.697815 1956 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 13 00:40:22.698228 env[1216]: time="2025-05-13T00:40:22.698150605Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:40:22.698455 kubelet[1956]: I0513 00:40:22.698409 1956 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 13 00:40:23.533272 systemd[1]: Created slice kubepods-besteffort-pod00710091_ab5b_4fdd_8d94_ce26fcf57399.slice. May 13 00:40:23.553918 kubelet[1956]: I0513 00:40:23.553875 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/00710091-ab5b-4fdd-8d94-ce26fcf57399-kube-proxy\") pod \"kube-proxy-wbvfv\" (UID: \"00710091-ab5b-4fdd-8d94-ce26fcf57399\") " pod="kube-system/kube-proxy-wbvfv" May 13 00:40:23.554106 kubelet[1956]: I0513 00:40:23.554087 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/00710091-ab5b-4fdd-8d94-ce26fcf57399-xtables-lock\") pod \"kube-proxy-wbvfv\" (UID: \"00710091-ab5b-4fdd-8d94-ce26fcf57399\") " pod="kube-system/kube-proxy-wbvfv" May 13 00:40:23.554183 kubelet[1956]: I0513 00:40:23.554169 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/00710091-ab5b-4fdd-8d94-ce26fcf57399-lib-modules\") pod \"kube-proxy-wbvfv\" (UID: \"00710091-ab5b-4fdd-8d94-ce26fcf57399\") " pod="kube-system/kube-proxy-wbvfv" May 13 00:40:23.554308 kubelet[1956]: I0513 00:40:23.554291 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6tt5q\" (UniqueName: \"kubernetes.io/projected/00710091-ab5b-4fdd-8d94-ce26fcf57399-kube-api-access-6tt5q\") pod \"kube-proxy-wbvfv\" (UID: \"00710091-ab5b-4fdd-8d94-ce26fcf57399\") " pod="kube-system/kube-proxy-wbvfv" May 13 00:40:23.662851 kubelet[1956]: I0513 00:40:23.662812 1956 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 00:40:23.746558 systemd[1]: Created slice kubepods-besteffort-pod28112fef_010f_4b0d_9856_ba8a36a1b34c.slice. May 13 00:40:23.755402 kubelet[1956]: I0513 00:40:23.755352 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/28112fef-010f-4b0d-9856-ba8a36a1b34c-var-lib-calico\") pod \"tigera-operator-789496d6f5-wwpwq\" (UID: \"28112fef-010f-4b0d-9856-ba8a36a1b34c\") " pod="tigera-operator/tigera-operator-789496d6f5-wwpwq" May 13 00:40:23.755402 kubelet[1956]: I0513 00:40:23.755408 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2tfqr\" (UniqueName: \"kubernetes.io/projected/28112fef-010f-4b0d-9856-ba8a36a1b34c-kube-api-access-2tfqr\") pod \"tigera-operator-789496d6f5-wwpwq\" (UID: \"28112fef-010f-4b0d-9856-ba8a36a1b34c\") " pod="tigera-operator/tigera-operator-789496d6f5-wwpwq" May 13 00:40:23.843189 kubelet[1956]: E0513 00:40:23.843079 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:23.843851 env[1216]: time="2025-05-13T00:40:23.843816377Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wbvfv,Uid:00710091-ab5b-4fdd-8d94-ce26fcf57399,Namespace:kube-system,Attempt:0,}" May 13 00:40:23.857667 env[1216]: time="2025-05-13T00:40:23.857271739Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:23.857667 env[1216]: time="2025-05-13T00:40:23.857325231Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:23.857667 env[1216]: time="2025-05-13T00:40:23.857336833Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:23.857667 env[1216]: time="2025-05-13T00:40:23.857471503Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d4dbc7ef0e756e698190ead316790c721a972bf62ac4f8c50284efab7c3c5b0 pid=2050 runtime=io.containerd.runc.v2 May 13 00:40:23.873628 systemd[1]: Started cri-containerd-5d4dbc7ef0e756e698190ead316790c721a972bf62ac4f8c50284efab7c3c5b0.scope. May 13 00:40:23.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.895796 kernel: kauditd_printk_skb: 10 callbacks suppressed May 13 00:40:23.895875 kernel: audit: type=1400 audit(1747096823.892:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.895894 kernel: audit: type=1400 audit(1747096823.892:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.898169 kernel: audit: type=1400 audit(1747096823.892:829): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.900471 kernel: audit: type=1400 audit(1747096823.892:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.905182 kernel: audit: type=1400 audit(1747096823.892:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.905236 kernel: audit: type=1400 audit(1747096823.892:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.909874 kernel: audit: type=1400 audit(1747096823.892:833): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.909911 kernel: audit: type=1400 audit(1747096823.892:834): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.914935 kernel: audit: type=1400 audit(1747096823.892:835): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.917504 kernel: audit: type=1400 audit(1747096823.892:836): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.892000 audit: BPF prog-id=106 op=LOAD May 13 00:40:23.893000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit[2059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2050 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:23.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346462633765663065373536653639383139306561643331363739 May 13 00:40:23.893000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit[2059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2050 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:23.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346462633765663065373536653639383139306561643331363739 May 13 00:40:23.893000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.893000 audit: BPF prog-id=107 op=LOAD May 13 00:40:23.893000 audit[2059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2050 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:23.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346462633765663065373536653639383139306561643331363739 May 13 00:40:23.895000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.895000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.895000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.895000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.895000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.895000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.895000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.895000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.895000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.895000 audit: BPF prog-id=108 op=LOAD May 13 00:40:23.895000 audit[2059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2050 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:23.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346462633765663065373536653639383139306561643331363739 May 13 00:40:23.897000 audit: BPF prog-id=108 op=UNLOAD May 13 00:40:23.897000 audit: BPF prog-id=107 op=UNLOAD May 13 00:40:23.897000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.897000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.897000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.897000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.897000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.897000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.897000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.897000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.897000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.897000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.897000 audit: BPF prog-id=109 op=LOAD May 13 00:40:23.897000 audit[2059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2050 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:23.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346462633765663065373536653639383139306561643331363739 May 13 00:40:23.925545 env[1216]: time="2025-05-13T00:40:23.925503078Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wbvfv,Uid:00710091-ab5b-4fdd-8d94-ce26fcf57399,Namespace:kube-system,Attempt:0,} returns sandbox id \"5d4dbc7ef0e756e698190ead316790c721a972bf62ac4f8c50284efab7c3c5b0\"" May 13 00:40:23.926130 kubelet[1956]: E0513 00:40:23.926093 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:23.928023 env[1216]: time="2025-05-13T00:40:23.927945263Z" level=info msg="CreateContainer within sandbox \"5d4dbc7ef0e756e698190ead316790c721a972bf62ac4f8c50284efab7c3c5b0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:40:23.943987 env[1216]: time="2025-05-13T00:40:23.943935790Z" level=info msg="CreateContainer within sandbox \"5d4dbc7ef0e756e698190ead316790c721a972bf62ac4f8c50284efab7c3c5b0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8db879d6dd7af34009157a7616d7eb02901ab60c4d01cac5b413803ffe68e275\"" May 13 00:40:23.944729 env[1216]: time="2025-05-13T00:40:23.944704241Z" level=info msg="StartContainer for \"8db879d6dd7af34009157a7616d7eb02901ab60c4d01cac5b413803ffe68e275\"" May 13 00:40:23.959196 systemd[1]: Started cri-containerd-8db879d6dd7af34009157a7616d7eb02901ab60c4d01cac5b413803ffe68e275.scope. May 13 00:40:23.982000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.982000 audit[2093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2050 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:23.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864623837396436646437616633343030393135376137363136643765 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit: BPF prog-id=110 op=LOAD May 13 00:40:23.983000 audit[2093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2050 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:23.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864623837396436646437616633343030393135376137363136643765 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.983000 audit: BPF prog-id=111 op=LOAD May 13 00:40:23.983000 audit[2093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2050 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:23.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864623837396436646437616633343030393135376137363136643765 May 13 00:40:23.984000 audit: BPF prog-id=111 op=UNLOAD May 13 00:40:23.984000 audit: BPF prog-id=110 op=UNLOAD May 13 00:40:23.984000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.984000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.984000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.984000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.984000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.984000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.984000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.984000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.984000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.984000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:23.984000 audit: BPF prog-id=112 op=LOAD May 13 00:40:23.984000 audit[2093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2050 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:23.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864623837396436646437616633343030393135376137363136643765 May 13 00:40:23.997647 env[1216]: time="2025-05-13T00:40:23.997598160Z" level=info msg="StartContainer for \"8db879d6dd7af34009157a7616d7eb02901ab60c4d01cac5b413803ffe68e275\" returns successfully" May 13 00:40:24.049998 env[1216]: time="2025-05-13T00:40:24.049953111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-wwpwq,Uid:28112fef-010f-4b0d-9856-ba8a36a1b34c,Namespace:tigera-operator,Attempt:0,}" May 13 00:40:24.066859 env[1216]: time="2025-05-13T00:40:24.065015735Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:24.066859 env[1216]: time="2025-05-13T00:40:24.065057784Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:24.066859 env[1216]: time="2025-05-13T00:40:24.065068507Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:24.066859 env[1216]: time="2025-05-13T00:40:24.065197014Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6474772ab9246b072ca031d88fa8b03bae7010c231d39af20c87ebc6f3015dff pid=2127 runtime=io.containerd.runc.v2 May 13 00:40:24.076716 systemd[1]: Started cri-containerd-6474772ab9246b072ca031d88fa8b03bae7010c231d39af20c87ebc6f3015dff.scope. May 13 00:40:24.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.102000 audit: BPF prog-id=113 op=LOAD May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2127 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373437373261623932343662303732636130333164383866613862 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2127 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373437373261623932343662303732636130333164383866613862 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit: BPF prog-id=114 op=LOAD May 13 00:40:24.103000 audit[2137]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2127 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373437373261623932343662303732636130333164383866613862 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit: BPF prog-id=115 op=LOAD May 13 00:40:24.103000 audit[2137]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2127 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373437373261623932343662303732636130333164383866613862 May 13 00:40:24.103000 audit: BPF prog-id=115 op=UNLOAD May 13 00:40:24.103000 audit: BPF prog-id=114 op=UNLOAD May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:24.103000 audit: BPF prog-id=116 op=LOAD May 13 00:40:24.103000 audit[2137]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2127 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373437373261623932343662303732636130333164383866613862 May 13 00:40:24.128064 env[1216]: time="2025-05-13T00:40:24.128014374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-wwpwq,Uid:28112fef-010f-4b0d-9856-ba8a36a1b34c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6474772ab9246b072ca031d88fa8b03bae7010c231d39af20c87ebc6f3015dff\"" May 13 00:40:24.129758 env[1216]: time="2025-05-13T00:40:24.129732137Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 13 00:40:24.190000 audit[2192]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.190000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6568eb0 a2=0 a3=1 items=0 ppid=2103 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:40:24.191000 audit[2194]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.191000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6650ef0 a2=0 a3=1 items=0 ppid=2103 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:40:24.191000 audit[2195]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.191000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc3e5adc0 a2=0 a3=1 items=0 ppid=2103 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.191000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:40:24.192000 audit[2197]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.192000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe635b70 a2=0 a3=1 items=0 ppid=2103 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:40:24.194000 audit[2198]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.194000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffcaa2a90 a2=0 a3=1 items=0 ppid=2103 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:40:24.195000 audit[2196]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.195000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc950fc50 a2=0 a3=1 items=0 ppid=2103 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:40:24.224328 kubelet[1956]: E0513 00:40:24.224294 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:24.293000 audit[2199]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.293000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcb0292f0 a2=0 a3=1 items=0 ppid=2103 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:40:24.300000 audit[2201]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.300000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffcfd54d0 a2=0 a3=1 items=0 ppid=2103 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:40:24.304000 audit[2204]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.304000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdedbd660 a2=0 a3=1 items=0 ppid=2103 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:40:24.304000 audit[2205]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.304000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff253b40 a2=0 a3=1 items=0 ppid=2103 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:40:24.306000 audit[2207]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.306000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe10ee110 a2=0 a3=1 items=0 ppid=2103 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:40:24.307000 audit[2208]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.307000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc62f7a0 a2=0 a3=1 items=0 ppid=2103 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:40:24.310000 audit[2210]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.310000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe0577280 a2=0 a3=1 items=0 ppid=2103 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:40:24.313000 audit[2213]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.313000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe739fcc0 a2=0 a3=1 items=0 ppid=2103 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:40:24.314000 audit[2214]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.314000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc235eff0 a2=0 a3=1 items=0 ppid=2103 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:40:24.316000 audit[2216]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.316000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc39773e0 a2=0 a3=1 items=0 ppid=2103 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:40:24.317000 audit[2217]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.317000 audit[2217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe2297350 a2=0 a3=1 items=0 ppid=2103 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:40:24.321000 audit[2219]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.321000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd8c81000 a2=0 a3=1 items=0 ppid=2103 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:40:24.325000 audit[2222]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.325000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff4b8dfe0 a2=0 a3=1 items=0 ppid=2103 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:40:24.327000 audit[2225]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.327000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff0382fb0 a2=0 a3=1 items=0 ppid=2103 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.327000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:40:24.328000 audit[2226]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.328000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdd372a60 a2=0 a3=1 items=0 ppid=2103 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:40:24.330000 audit[2228]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.330000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc2460950 a2=0 a3=1 items=0 ppid=2103 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:40:24.333000 audit[2231]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.333000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdc8afca0 a2=0 a3=1 items=0 ppid=2103 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:40:24.334000 audit[2232]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.334000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc262d00 a2=0 a3=1 items=0 ppid=2103 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:40:24.337000 audit[2234]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:24.337000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffdaba5000 a2=0 a3=1 items=0 ppid=2103 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.337000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:40:24.361000 audit[2240]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:24.361000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffffb5ea00 a2=0 a3=1 items=0 ppid=2103 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.361000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:24.371000 audit[2240]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:24.371000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffffb5ea00 a2=0 a3=1 items=0 ppid=2103 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.371000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:24.373000 audit[2245]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.373000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd7c02040 a2=0 a3=1 items=0 ppid=2103 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:40:24.375000 audit[2247]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.375000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff77dc600 a2=0 a3=1 items=0 ppid=2103 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:40:24.378000 audit[2250]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.378000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd5cf8060 a2=0 a3=1 items=0 ppid=2103 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:40:24.379000 audit[2251]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.379000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0e3e2b0 a2=0 a3=1 items=0 ppid=2103 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:40:24.381000 audit[2253]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.381000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffc435b40 a2=0 a3=1 items=0 ppid=2103 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:40:24.382000 audit[2254]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.382000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5dd0700 a2=0 a3=1 items=0 ppid=2103 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:40:24.385000 audit[2256]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.385000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdea3bbd0 a2=0 a3=1 items=0 ppid=2103 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:40:24.388000 audit[2259]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.388000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffdda389c0 a2=0 a3=1 items=0 ppid=2103 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:40:24.389000 audit[2260]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.389000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd84d2050 a2=0 a3=1 items=0 ppid=2103 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.389000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:40:24.391000 audit[2262]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.391000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc6272250 a2=0 a3=1 items=0 ppid=2103 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:40:24.392000 audit[2263]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.392000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc558a50 a2=0 a3=1 items=0 ppid=2103 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:40:24.396000 audit[2265]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.396000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff5783000 a2=0 a3=1 items=0 ppid=2103 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.396000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:40:24.400000 audit[2268]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.400000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe142ca30 a2=0 a3=1 items=0 ppid=2103 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:40:24.403000 audit[2271]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.403000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3bd4f80 a2=0 a3=1 items=0 ppid=2103 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:40:24.404000 audit[2272]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.404000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc54165f0 a2=0 a3=1 items=0 ppid=2103 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:40:24.406000 audit[2274]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.406000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd3567e70 a2=0 a3=1 items=0 ppid=2103 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:40:24.409000 audit[2277]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.409000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdedca360 a2=0 a3=1 items=0 ppid=2103 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.409000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:40:24.410000 audit[2278]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.410000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe462cf20 a2=0 a3=1 items=0 ppid=2103 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:40:24.413000 audit[2280]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.413000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc4167320 a2=0 a3=1 items=0 ppid=2103 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:40:24.414000 audit[2281]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.414000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6b46ae0 a2=0 a3=1 items=0 ppid=2103 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:40:24.416000 audit[2283]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.416000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcf49a870 a2=0 a3=1 items=0 ppid=2103 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:40:24.419000 audit[2286]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:24.419000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdd4b71e0 a2=0 a3=1 items=0 ppid=2103 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:40:24.422000 audit[2288]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:40:24.422000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffc4daac30 a2=0 a3=1 items=0 ppid=2103 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.422000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:24.423000 audit[2288]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:40:24.423000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc4daac30 a2=0 a3=1 items=0 ppid=2103 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:24.423000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:25.889235 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1483034398.mount: Deactivated successfully. May 13 00:40:26.356693 env[1216]: time="2025-05-13T00:40:26.356644215Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:26.358241 env[1216]: time="2025-05-13T00:40:26.358193909Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:26.360028 env[1216]: time="2025-05-13T00:40:26.359996412Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:26.361365 env[1216]: time="2025-05-13T00:40:26.361325185Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:26.361960 env[1216]: time="2025-05-13T00:40:26.361928740Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 13 00:40:26.364780 env[1216]: time="2025-05-13T00:40:26.364365323Z" level=info msg="CreateContainer within sandbox \"6474772ab9246b072ca031d88fa8b03bae7010c231d39af20c87ebc6f3015dff\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 13 00:40:26.373569 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1829584044.mount: Deactivated successfully. May 13 00:40:26.374552 env[1216]: time="2025-05-13T00:40:26.374516015Z" level=info msg="CreateContainer within sandbox \"6474772ab9246b072ca031d88fa8b03bae7010c231d39af20c87ebc6f3015dff\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"3f739a399711606fd44eba7bf19a06440bc8e98ba06fb79cf6d30fc72b286624\"" May 13 00:40:26.375162 env[1216]: time="2025-05-13T00:40:26.374991145Z" level=info msg="StartContainer for \"3f739a399711606fd44eba7bf19a06440bc8e98ba06fb79cf6d30fc72b286624\"" May 13 00:40:26.393432 systemd[1]: Started cri-containerd-3f739a399711606fd44eba7bf19a06440bc8e98ba06fb79cf6d30fc72b286624.scope. May 13 00:40:26.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.427000 audit: BPF prog-id=117 op=LOAD May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2127 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:26.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373339613339393731313630366664343465626137626631396130 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2127 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:26.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373339613339393731313630366664343465626137626631396130 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit: BPF prog-id=118 op=LOAD May 13 00:40:26.428000 audit[2296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2127 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:26.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373339613339393731313630366664343465626137626631396130 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit: BPF prog-id=119 op=LOAD May 13 00:40:26.428000 audit[2296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2127 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:26.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373339613339393731313630366664343465626137626631396130 May 13 00:40:26.428000 audit: BPF prog-id=119 op=UNLOAD May 13 00:40:26.428000 audit: BPF prog-id=118 op=UNLOAD May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:26.428000 audit: BPF prog-id=120 op=LOAD May 13 00:40:26.428000 audit[2296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2127 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:26.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373339613339393731313630366664343465626137626631396130 May 13 00:40:26.460621 env[1216]: time="2025-05-13T00:40:26.460488931Z" level=info msg="StartContainer for \"3f739a399711606fd44eba7bf19a06440bc8e98ba06fb79cf6d30fc72b286624\" returns successfully" May 13 00:40:26.791018 kubelet[1956]: E0513 00:40:26.790981 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:26.800795 kubelet[1956]: I0513 00:40:26.800734 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-wbvfv" podStartSLOduration=3.8007114570000002 podStartE2EDuration="3.800711457s" podCreationTimestamp="2025-05-13 00:40:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:40:24.234275879 +0000 UTC m=+9.132479228" watchObservedRunningTime="2025-05-13 00:40:26.800711457 +0000 UTC m=+11.698914806" May 13 00:40:27.968801 update_engine[1206]: I0513 00:40:27.968752 1206 update_attempter.cc:509] Updating boot flags... May 13 00:40:28.758654 kubelet[1956]: E0513 00:40:28.758082 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:28.773912 kubelet[1956]: I0513 00:40:28.773848 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-wwpwq" podStartSLOduration=3.539883864 podStartE2EDuration="5.773829452s" podCreationTimestamp="2025-05-13 00:40:23 +0000 UTC" firstStartedPulling="2025-05-13 00:40:24.129165137 +0000 UTC m=+9.027368486" lastFinishedPulling="2025-05-13 00:40:26.363110725 +0000 UTC m=+11.261314074" observedRunningTime="2025-05-13 00:40:27.239127253 +0000 UTC m=+12.137330602" watchObservedRunningTime="2025-05-13 00:40:28.773829452 +0000 UTC m=+13.672032801" May 13 00:40:30.011000 audit[2345]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:30.013772 kernel: kauditd_printk_skb: 357 callbacks suppressed May 13 00:40:30.013924 kernel: audit: type=1325 audit(1747096830.011:938): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:30.011000 audit[2345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffeb629530 a2=0 a3=1 items=0 ppid=2103 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.019258 kernel: audit: type=1300 audit(1747096830.011:938): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffeb629530 a2=0 a3=1 items=0 ppid=2103 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.019324 kernel: audit: type=1327 audit(1747096830.011:938): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:30.011000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:30.021000 audit[2345]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:30.021000 audit[2345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffeb629530 a2=0 a3=1 items=0 ppid=2103 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.028821 kernel: audit: type=1325 audit(1747096830.021:939): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:30.028893 kernel: audit: type=1300 audit(1747096830.021:939): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffeb629530 a2=0 a3=1 items=0 ppid=2103 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.028931 kernel: audit: type=1327 audit(1747096830.021:939): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:30.021000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:30.041000 audit[2347]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:30.041000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe9b6ba90 a2=0 a3=1 items=0 ppid=2103 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.048862 kernel: audit: type=1325 audit(1747096830.041:940): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:30.048952 kernel: audit: type=1300 audit(1747096830.041:940): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe9b6ba90 a2=0 a3=1 items=0 ppid=2103 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:30.050950 kernel: audit: type=1327 audit(1747096830.041:940): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:30.050000 audit[2347]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:30.050000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe9b6ba90 a2=0 a3=1 items=0 ppid=2103 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.050000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:30.054513 kernel: audit: type=1325 audit(1747096830.050:941): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:30.220270 systemd[1]: Created slice kubepods-besteffort-poda7860aa7_d6a2_4ed1_a9b8_8ddac6bda11f.slice. May 13 00:40:30.235121 kubelet[1956]: I0513 00:40:30.235073 1956 status_manager.go:890] "Failed to get status for pod" podUID="51b10a87-98b0-4e5a-b532-aef43f65d1cf" pod="calico-system/calico-node-zmzx8" err="pods \"calico-node-zmzx8\" is forbidden: User \"system:node:localhost\" cannot get resource \"pods\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'localhost' and this object" May 13 00:40:30.235531 kubelet[1956]: W0513 00:40:30.235506 1956 reflector.go:569] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object May 13 00:40:30.235662 kubelet[1956]: W0513 00:40:30.235632 1956 reflector.go:569] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object May 13 00:40:30.235719 kubelet[1956]: E0513 00:40:30.235668 1956 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"cni-config\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"cni-config\" is forbidden: User \"system:node:localhost\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'localhost' and this object" logger="UnhandledError" May 13 00:40:30.235783 kubelet[1956]: E0513 00:40:30.235647 1956 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"node-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"node-certs\" is forbidden: User \"system:node:localhost\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'localhost' and this object" logger="UnhandledError" May 13 00:40:30.238509 systemd[1]: Created slice kubepods-besteffort-pod51b10a87_98b0_4e5a_b532_aef43f65d1cf.slice. May 13 00:40:30.302508 kubelet[1956]: I0513 00:40:30.302374 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a7860aa7-d6a2-4ed1-a9b8-8ddac6bda11f-tigera-ca-bundle\") pod \"calico-typha-6ffb55556f-5zbxc\" (UID: \"a7860aa7-d6a2-4ed1-a9b8-8ddac6bda11f\") " pod="calico-system/calico-typha-6ffb55556f-5zbxc" May 13 00:40:30.302508 kubelet[1956]: I0513 00:40:30.302424 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/51b10a87-98b0-4e5a-b532-aef43f65d1cf-var-lib-calico\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.302508 kubelet[1956]: I0513 00:40:30.302502 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/51b10a87-98b0-4e5a-b532-aef43f65d1cf-cni-log-dir\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.302687 kubelet[1956]: I0513 00:40:30.302548 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6fdkx\" (UniqueName: \"kubernetes.io/projected/a7860aa7-d6a2-4ed1-a9b8-8ddac6bda11f-kube-api-access-6fdkx\") pod \"calico-typha-6ffb55556f-5zbxc\" (UID: \"a7860aa7-d6a2-4ed1-a9b8-8ddac6bda11f\") " pod="calico-system/calico-typha-6ffb55556f-5zbxc" May 13 00:40:30.302687 kubelet[1956]: I0513 00:40:30.302587 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/51b10a87-98b0-4e5a-b532-aef43f65d1cf-node-certs\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.302687 kubelet[1956]: I0513 00:40:30.302619 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/51b10a87-98b0-4e5a-b532-aef43f65d1cf-flexvol-driver-host\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.302687 kubelet[1956]: I0513 00:40:30.302647 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/51b10a87-98b0-4e5a-b532-aef43f65d1cf-cni-net-dir\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.302687 kubelet[1956]: I0513 00:40:30.302663 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/a7860aa7-d6a2-4ed1-a9b8-8ddac6bda11f-typha-certs\") pod \"calico-typha-6ffb55556f-5zbxc\" (UID: \"a7860aa7-d6a2-4ed1-a9b8-8ddac6bda11f\") " pod="calico-system/calico-typha-6ffb55556f-5zbxc" May 13 00:40:30.302799 kubelet[1956]: I0513 00:40:30.302689 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/51b10a87-98b0-4e5a-b532-aef43f65d1cf-xtables-lock\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.302799 kubelet[1956]: I0513 00:40:30.302706 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/51b10a87-98b0-4e5a-b532-aef43f65d1cf-tigera-ca-bundle\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.302799 kubelet[1956]: I0513 00:40:30.302723 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/51b10a87-98b0-4e5a-b532-aef43f65d1cf-cni-bin-dir\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.302799 kubelet[1956]: I0513 00:40:30.302739 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/51b10a87-98b0-4e5a-b532-aef43f65d1cf-var-run-calico\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.302799 kubelet[1956]: I0513 00:40:30.302758 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/51b10a87-98b0-4e5a-b532-aef43f65d1cf-policysync\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.302908 kubelet[1956]: I0513 00:40:30.302776 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/51b10a87-98b0-4e5a-b532-aef43f65d1cf-lib-modules\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.302908 kubelet[1956]: I0513 00:40:30.302791 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gfn6c\" (UniqueName: \"kubernetes.io/projected/51b10a87-98b0-4e5a-b532-aef43f65d1cf-kube-api-access-gfn6c\") pod \"calico-node-zmzx8\" (UID: \"51b10a87-98b0-4e5a-b532-aef43f65d1cf\") " pod="calico-system/calico-node-zmzx8" May 13 00:40:30.309852 kubelet[1956]: E0513 00:40:30.309808 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnv28" podUID="7fb607c6-e13a-4bd1-be40-1ff0cacb38e0" May 13 00:40:30.403576 kubelet[1956]: I0513 00:40:30.403523 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/7fb607c6-e13a-4bd1-be40-1ff0cacb38e0-varrun\") pod \"csi-node-driver-wnv28\" (UID: \"7fb607c6-e13a-4bd1-be40-1ff0cacb38e0\") " pod="calico-system/csi-node-driver-wnv28" May 13 00:40:30.403576 kubelet[1956]: I0513 00:40:30.403566 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/7fb607c6-e13a-4bd1-be40-1ff0cacb38e0-socket-dir\") pod \"csi-node-driver-wnv28\" (UID: \"7fb607c6-e13a-4bd1-be40-1ff0cacb38e0\") " pod="calico-system/csi-node-driver-wnv28" May 13 00:40:30.403765 kubelet[1956]: I0513 00:40:30.403739 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/7fb607c6-e13a-4bd1-be40-1ff0cacb38e0-kubelet-dir\") pod \"csi-node-driver-wnv28\" (UID: \"7fb607c6-e13a-4bd1-be40-1ff0cacb38e0\") " pod="calico-system/csi-node-driver-wnv28" May 13 00:40:30.403765 kubelet[1956]: I0513 00:40:30.403761 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/7fb607c6-e13a-4bd1-be40-1ff0cacb38e0-registration-dir\") pod \"csi-node-driver-wnv28\" (UID: \"7fb607c6-e13a-4bd1-be40-1ff0cacb38e0\") " pod="calico-system/csi-node-driver-wnv28" May 13 00:40:30.403950 kubelet[1956]: I0513 00:40:30.403917 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m8kx6\" (UniqueName: \"kubernetes.io/projected/7fb607c6-e13a-4bd1-be40-1ff0cacb38e0-kube-api-access-m8kx6\") pod \"csi-node-driver-wnv28\" (UID: \"7fb607c6-e13a-4bd1-be40-1ff0cacb38e0\") " pod="calico-system/csi-node-driver-wnv28" May 13 00:40:30.405207 kubelet[1956]: E0513 00:40:30.405172 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.405207 kubelet[1956]: W0513 00:40:30.405195 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.405326 kubelet[1956]: E0513 00:40:30.405217 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.411618 kubelet[1956]: E0513 00:40:30.411580 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.411618 kubelet[1956]: W0513 00:40:30.411602 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.411618 kubelet[1956]: E0513 00:40:30.411622 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.422603 kubelet[1956]: E0513 00:40:30.422573 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.422603 kubelet[1956]: W0513 00:40:30.422598 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.422757 kubelet[1956]: E0513 00:40:30.422621 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.424302 kubelet[1956]: E0513 00:40:30.424265 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.424302 kubelet[1956]: W0513 00:40:30.424287 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.424302 kubelet[1956]: E0513 00:40:30.424305 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.505285 kubelet[1956]: E0513 00:40:30.505246 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.505285 kubelet[1956]: W0513 00:40:30.505269 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.505285 kubelet[1956]: E0513 00:40:30.505288 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.505532 kubelet[1956]: E0513 00:40:30.505518 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.505532 kubelet[1956]: W0513 00:40:30.505530 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.505611 kubelet[1956]: E0513 00:40:30.505546 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.505720 kubelet[1956]: E0513 00:40:30.505699 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.505720 kubelet[1956]: W0513 00:40:30.505710 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.505720 kubelet[1956]: E0513 00:40:30.505720 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.505868 kubelet[1956]: E0513 00:40:30.505856 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.505868 kubelet[1956]: W0513 00:40:30.505865 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.505924 kubelet[1956]: E0513 00:40:30.505875 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.506018 kubelet[1956]: E0513 00:40:30.506008 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.506018 kubelet[1956]: W0513 00:40:30.506017 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.506077 kubelet[1956]: E0513 00:40:30.506028 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.506178 kubelet[1956]: E0513 00:40:30.506166 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.506178 kubelet[1956]: W0513 00:40:30.506176 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.506238 kubelet[1956]: E0513 00:40:30.506189 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.506307 kubelet[1956]: E0513 00:40:30.506297 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.506307 kubelet[1956]: W0513 00:40:30.506306 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.506368 kubelet[1956]: E0513 00:40:30.506319 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.506446 kubelet[1956]: E0513 00:40:30.506435 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.506446 kubelet[1956]: W0513 00:40:30.506444 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.506531 kubelet[1956]: E0513 00:40:30.506481 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.506679 kubelet[1956]: E0513 00:40:30.506653 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.506679 kubelet[1956]: W0513 00:40:30.506665 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.506745 kubelet[1956]: E0513 00:40:30.506702 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.506805 kubelet[1956]: E0513 00:40:30.506794 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.506805 kubelet[1956]: W0513 00:40:30.506805 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.506866 kubelet[1956]: E0513 00:40:30.506817 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.506937 kubelet[1956]: E0513 00:40:30.506927 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.506937 kubelet[1956]: W0513 00:40:30.506935 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.506995 kubelet[1956]: E0513 00:40:30.506968 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.507049 kubelet[1956]: E0513 00:40:30.507040 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.507049 kubelet[1956]: W0513 00:40:30.507048 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.507112 kubelet[1956]: E0513 00:40:30.507079 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.507168 kubelet[1956]: E0513 00:40:30.507157 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.507168 kubelet[1956]: W0513 00:40:30.507166 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.507237 kubelet[1956]: E0513 00:40:30.507223 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.507313 kubelet[1956]: E0513 00:40:30.507302 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.507313 kubelet[1956]: W0513 00:40:30.507311 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.507374 kubelet[1956]: E0513 00:40:30.507323 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.507697 kubelet[1956]: E0513 00:40:30.507677 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.507789 kubelet[1956]: W0513 00:40:30.507774 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.507863 kubelet[1956]: E0513 00:40:30.507849 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.508053 kubelet[1956]: E0513 00:40:30.508037 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.508103 kubelet[1956]: W0513 00:40:30.508053 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.508103 kubelet[1956]: E0513 00:40:30.508071 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.508390 kubelet[1956]: E0513 00:40:30.508361 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.508390 kubelet[1956]: W0513 00:40:30.508375 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.508449 kubelet[1956]: E0513 00:40:30.508403 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.508581 kubelet[1956]: E0513 00:40:30.508569 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.508581 kubelet[1956]: W0513 00:40:30.508580 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.508655 kubelet[1956]: E0513 00:40:30.508629 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.508741 kubelet[1956]: E0513 00:40:30.508728 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.508741 kubelet[1956]: W0513 00:40:30.508738 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.508806 kubelet[1956]: E0513 00:40:30.508776 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.508892 kubelet[1956]: E0513 00:40:30.508878 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.508892 kubelet[1956]: W0513 00:40:30.508889 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.508959 kubelet[1956]: E0513 00:40:30.508902 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.509113 kubelet[1956]: E0513 00:40:30.509100 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.509155 kubelet[1956]: W0513 00:40:30.509113 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.509155 kubelet[1956]: E0513 00:40:30.509125 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.509342 kubelet[1956]: E0513 00:40:30.509328 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.509342 kubelet[1956]: W0513 00:40:30.509340 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.509404 kubelet[1956]: E0513 00:40:30.509354 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.509597 kubelet[1956]: E0513 00:40:30.509586 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.509597 kubelet[1956]: W0513 00:40:30.509597 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.509670 kubelet[1956]: E0513 00:40:30.509610 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.509750 kubelet[1956]: E0513 00:40:30.509741 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.509750 kubelet[1956]: W0513 00:40:30.509750 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.509814 kubelet[1956]: E0513 00:40:30.509758 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.510008 kubelet[1956]: E0513 00:40:30.509998 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.510158 kubelet[1956]: W0513 00:40:30.510010 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.510158 kubelet[1956]: E0513 00:40:30.510019 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.522243 kubelet[1956]: E0513 00:40:30.522207 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:30.522243 kubelet[1956]: W0513 00:40:30.522229 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:30.522243 kubelet[1956]: E0513 00:40:30.522248 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:30.524086 kubelet[1956]: E0513 00:40:30.524050 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:30.524770 env[1216]: time="2025-05-13T00:40:30.524730268Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6ffb55556f-5zbxc,Uid:a7860aa7-d6a2-4ed1-a9b8-8ddac6bda11f,Namespace:calico-system,Attempt:0,}" May 13 00:40:30.540534 env[1216]: time="2025-05-13T00:40:30.540233235Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:30.540534 env[1216]: time="2025-05-13T00:40:30.540279243Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:30.540534 env[1216]: time="2025-05-13T00:40:30.540289244Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:30.540534 env[1216]: time="2025-05-13T00:40:30.540466072Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aa45a42c0ab74c0dd219239fa4255405fa48ef07b1c71d0cdcbb0b8fb9c384f9 pid=2389 runtime=io.containerd.runc.v2 May 13 00:40:30.552829 systemd[1]: Started cri-containerd-aa45a42c0ab74c0dd219239fa4255405fa48ef07b1c71d0cdcbb0b8fb9c384f9.scope. May 13 00:40:30.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.590000 audit: BPF prog-id=121 op=LOAD May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2389 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343561343263306162373463306464323139323339666134323535 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2389 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343561343263306162373463306464323139323339666134323535 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit: BPF prog-id=122 op=LOAD May 13 00:40:30.591000 audit[2398]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2389 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343561343263306162373463306464323139323339666134323535 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit: BPF prog-id=123 op=LOAD May 13 00:40:30.591000 audit[2398]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2389 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343561343263306162373463306464323139323339666134323535 May 13 00:40:30.591000 audit: BPF prog-id=123 op=UNLOAD May 13 00:40:30.591000 audit: BPF prog-id=122 op=UNLOAD May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:30.591000 audit: BPF prog-id=124 op=LOAD May 13 00:40:30.591000 audit[2398]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2389 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343561343263306162373463306464323139323339666134323535 May 13 00:40:30.609532 env[1216]: time="2025-05-13T00:40:30.609467067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6ffb55556f-5zbxc,Uid:a7860aa7-d6a2-4ed1-a9b8-8ddac6bda11f,Namespace:calico-system,Attempt:0,} returns sandbox id \"aa45a42c0ab74c0dd219239fa4255405fa48ef07b1c71d0cdcbb0b8fb9c384f9\"" May 13 00:40:30.610706 kubelet[1956]: E0513 00:40:30.610679 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:30.612267 env[1216]: time="2025-05-13T00:40:30.612238778Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 13 00:40:31.063000 audit[2423]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:31.063000 audit[2423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffd2d48710 a2=0 a3=1 items=0 ppid=2103 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:31.063000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:31.069000 audit[2423]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:31.069000 audit[2423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd2d48710 a2=0 a3=1 items=0 ppid=2103 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:31.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:31.298091 kubelet[1956]: E0513 00:40:31.298012 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:31.298091 kubelet[1956]: W0513 00:40:31.298032 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:31.298091 kubelet[1956]: E0513 00:40:31.298051 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:31.445668 kubelet[1956]: E0513 00:40:31.444368 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:31.445827 env[1216]: time="2025-05-13T00:40:31.445208340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zmzx8,Uid:51b10a87-98b0-4e5a-b532-aef43f65d1cf,Namespace:calico-system,Attempt:0,}" May 13 00:40:31.464292 env[1216]: time="2025-05-13T00:40:31.464202949Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:31.464292 env[1216]: time="2025-05-13T00:40:31.464258997Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:31.464292 env[1216]: time="2025-05-13T00:40:31.464269959Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:31.464724 env[1216]: time="2025-05-13T00:40:31.464673338Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/829f3bad892ab0d980fea32ee5d2fe7b31c8a254b9c4f36c515122b93977a77c pid=2434 runtime=io.containerd.runc.v2 May 13 00:40:31.476779 systemd[1]: Started cri-containerd-829f3bad892ab0d980fea32ee5d2fe7b31c8a254b9c4f36c515122b93977a77c.scope. May 13 00:40:31.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.497000 audit: BPF prog-id=125 op=LOAD May 13 00:40:31.497000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.497000 audit[2444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2434 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:31.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396633626164383932616230643938306665613332656535643266 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2434 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:31.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396633626164383932616230643938306665613332656535643266 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit: BPF prog-id=126 op=LOAD May 13 00:40:31.498000 audit[2444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2434 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:31.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396633626164383932616230643938306665613332656535643266 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit: BPF prog-id=127 op=LOAD May 13 00:40:31.498000 audit[2444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2434 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:31.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396633626164383932616230643938306665613332656535643266 May 13 00:40:31.498000 audit: BPF prog-id=127 op=UNLOAD May 13 00:40:31.498000 audit: BPF prog-id=126 op=UNLOAD May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:31.498000 audit: BPF prog-id=128 op=LOAD May 13 00:40:31.498000 audit[2444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2434 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:31.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396633626164383932616230643938306665613332656535643266 May 13 00:40:31.513042 env[1216]: time="2025-05-13T00:40:31.512995244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zmzx8,Uid:51b10a87-98b0-4e5a-b532-aef43f65d1cf,Namespace:calico-system,Attempt:0,} returns sandbox id \"829f3bad892ab0d980fea32ee5d2fe7b31c8a254b9c4f36c515122b93977a77c\"" May 13 00:40:31.513698 kubelet[1956]: E0513 00:40:31.513669 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:32.199678 kubelet[1956]: E0513 00:40:32.199632 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnv28" podUID="7fb607c6-e13a-4bd1-be40-1ff0cacb38e0" May 13 00:40:32.447356 env[1216]: time="2025-05-13T00:40:32.447280828Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:32.448942 env[1216]: time="2025-05-13T00:40:32.448902137Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:32.450684 env[1216]: time="2025-05-13T00:40:32.450602016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:32.451876 env[1216]: time="2025-05-13T00:40:32.451850152Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:32.452261 env[1216]: time="2025-05-13T00:40:32.452238687Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 13 00:40:32.454066 env[1216]: time="2025-05-13T00:40:32.454038701Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:40:32.463411 env[1216]: time="2025-05-13T00:40:32.463363855Z" level=info msg="CreateContainer within sandbox \"aa45a42c0ab74c0dd219239fa4255405fa48ef07b1c71d0cdcbb0b8fb9c384f9\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 00:40:32.474274 env[1216]: time="2025-05-13T00:40:32.474213304Z" level=info msg="CreateContainer within sandbox \"aa45a42c0ab74c0dd219239fa4255405fa48ef07b1c71d0cdcbb0b8fb9c384f9\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"243815f77fb08bf842e96444a7aea8c055c4e7e00a1b64ca4b075392a4822a8b\"" May 13 00:40:32.475593 env[1216]: time="2025-05-13T00:40:32.474877157Z" level=info msg="StartContainer for \"243815f77fb08bf842e96444a7aea8c055c4e7e00a1b64ca4b075392a4822a8b\"" May 13 00:40:32.490993 systemd[1]: Started cri-containerd-243815f77fb08bf842e96444a7aea8c055c4e7e00a1b64ca4b075392a4822a8b.scope. May 13 00:40:32.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.524000 audit: BPF prog-id=129 op=LOAD May 13 00:40:32.525000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit[2475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2389 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:32.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234333831356637376662303862663834326539363434346137616561 May 13 00:40:32.525000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit[2475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2389 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:32.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234333831356637376662303862663834326539363434346137616561 May 13 00:40:32.525000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.525000 audit: BPF prog-id=130 op=LOAD May 13 00:40:32.525000 audit[2475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2389 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:32.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234333831356637376662303862663834326539363434346137616561 May 13 00:40:32.526000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.526000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.526000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.526000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.526000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.526000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.526000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.526000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.526000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.526000 audit: BPF prog-id=131 op=LOAD May 13 00:40:32.526000 audit[2475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2389 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:32.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234333831356637376662303862663834326539363434346137616561 May 13 00:40:32.527000 audit: BPF prog-id=131 op=UNLOAD May 13 00:40:32.527000 audit: BPF prog-id=130 op=UNLOAD May 13 00:40:32.527000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.527000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.527000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.527000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.527000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.527000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.527000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.527000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.527000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.527000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:32.527000 audit: BPF prog-id=132 op=LOAD May 13 00:40:32.527000 audit[2475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2389 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:32.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234333831356637376662303862663834326539363434346137616561 May 13 00:40:32.549809 env[1216]: time="2025-05-13T00:40:32.549753590Z" level=info msg="StartContainer for \"243815f77fb08bf842e96444a7aea8c055c4e7e00a1b64ca4b075392a4822a8b\" returns successfully" May 13 00:40:33.242484 kubelet[1956]: E0513 00:40:33.242439 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:33.254132 kubelet[1956]: I0513 00:40:33.254075 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6ffb55556f-5zbxc" podStartSLOduration=1.41233588 podStartE2EDuration="3.254036117s" podCreationTimestamp="2025-05-13 00:40:30 +0000 UTC" firstStartedPulling="2025-05-13 00:40:30.611627843 +0000 UTC m=+15.509831192" lastFinishedPulling="2025-05-13 00:40:32.45332808 +0000 UTC m=+17.351531429" observedRunningTime="2025-05-13 00:40:33.253900259 +0000 UTC m=+18.152103648" watchObservedRunningTime="2025-05-13 00:40:33.254036117 +0000 UTC m=+18.152239466" May 13 00:40:33.274000 audit[2507]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:33.274000 audit[2507]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffffff295d0 a2=0 a3=1 items=0 ppid=2103 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:33.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:33.280000 audit[2507]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:33.280000 audit[2507]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=fffffff295d0 a2=0 a3=1 items=0 ppid=2103 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:33.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:33.302011 kubelet[1956]: E0513 00:40:33.301983 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.302011 kubelet[1956]: W0513 00:40:33.302006 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.302182 kubelet[1956]: E0513 00:40:33.302027 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.302221 kubelet[1956]: E0513 00:40:33.302207 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.302254 kubelet[1956]: W0513 00:40:33.302218 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.302293 kubelet[1956]: E0513 00:40:33.302253 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.302419 kubelet[1956]: E0513 00:40:33.302410 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.302453 kubelet[1956]: W0513 00:40:33.302420 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.302453 kubelet[1956]: E0513 00:40:33.302428 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.302580 kubelet[1956]: E0513 00:40:33.302571 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.302580 kubelet[1956]: W0513 00:40:33.302581 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.302693 kubelet[1956]: E0513 00:40:33.302589 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.302759 kubelet[1956]: E0513 00:40:33.302748 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.302759 kubelet[1956]: W0513 00:40:33.302758 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.302824 kubelet[1956]: E0513 00:40:33.302766 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.302910 kubelet[1956]: E0513 00:40:33.302902 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.302954 kubelet[1956]: W0513 00:40:33.302910 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.302954 kubelet[1956]: E0513 00:40:33.302918 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.303048 kubelet[1956]: E0513 00:40:33.303040 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.303081 kubelet[1956]: W0513 00:40:33.303049 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.303081 kubelet[1956]: E0513 00:40:33.303056 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.303180 kubelet[1956]: E0513 00:40:33.303172 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.303216 kubelet[1956]: W0513 00:40:33.303180 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.303216 kubelet[1956]: E0513 00:40:33.303187 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.303316 kubelet[1956]: E0513 00:40:33.303308 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.303345 kubelet[1956]: W0513 00:40:33.303316 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.303345 kubelet[1956]: E0513 00:40:33.303324 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.303440 kubelet[1956]: E0513 00:40:33.303432 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.303440 kubelet[1956]: W0513 00:40:33.303440 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.303508 kubelet[1956]: E0513 00:40:33.303446 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.303577 kubelet[1956]: E0513 00:40:33.303569 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.303610 kubelet[1956]: W0513 00:40:33.303577 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.303610 kubelet[1956]: E0513 00:40:33.303586 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.303707 kubelet[1956]: E0513 00:40:33.303700 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.303738 kubelet[1956]: W0513 00:40:33.303707 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.303738 kubelet[1956]: E0513 00:40:33.303714 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.303839 kubelet[1956]: E0513 00:40:33.303832 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.303869 kubelet[1956]: W0513 00:40:33.303841 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.303869 kubelet[1956]: E0513 00:40:33.303848 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.304000 kubelet[1956]: E0513 00:40:33.303992 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.304028 kubelet[1956]: W0513 00:40:33.304000 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.304028 kubelet[1956]: E0513 00:40:33.304007 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.304140 kubelet[1956]: E0513 00:40:33.304132 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.304140 kubelet[1956]: W0513 00:40:33.304140 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.304202 kubelet[1956]: E0513 00:40:33.304147 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.324966 kubelet[1956]: E0513 00:40:33.324940 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.325110 kubelet[1956]: W0513 00:40:33.325094 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.325213 kubelet[1956]: E0513 00:40:33.325200 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.325474 kubelet[1956]: E0513 00:40:33.325462 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.325567 kubelet[1956]: W0513 00:40:33.325555 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.325767 kubelet[1956]: E0513 00:40:33.325751 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.326067 kubelet[1956]: E0513 00:40:33.326051 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.326114 kubelet[1956]: W0513 00:40:33.326067 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.326114 kubelet[1956]: E0513 00:40:33.326086 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.326258 kubelet[1956]: E0513 00:40:33.326247 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.326258 kubelet[1956]: W0513 00:40:33.326257 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.326324 kubelet[1956]: E0513 00:40:33.326272 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.326427 kubelet[1956]: E0513 00:40:33.326418 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.326464 kubelet[1956]: W0513 00:40:33.326427 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.326464 kubelet[1956]: E0513 00:40:33.326441 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.326626 kubelet[1956]: E0513 00:40:33.326616 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.326658 kubelet[1956]: W0513 00:40:33.326627 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.326658 kubelet[1956]: E0513 00:40:33.326642 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.326875 kubelet[1956]: E0513 00:40:33.326861 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.326875 kubelet[1956]: W0513 00:40:33.326873 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.326958 kubelet[1956]: E0513 00:40:33.326895 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.327096 kubelet[1956]: E0513 00:40:33.327086 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.327126 kubelet[1956]: W0513 00:40:33.327097 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.327184 kubelet[1956]: E0513 00:40:33.327168 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.327247 kubelet[1956]: E0513 00:40:33.327236 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.327247 kubelet[1956]: W0513 00:40:33.327245 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.327305 kubelet[1956]: E0513 00:40:33.327255 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.327414 kubelet[1956]: E0513 00:40:33.327401 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.327414 kubelet[1956]: W0513 00:40:33.327411 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.327470 kubelet[1956]: E0513 00:40:33.327419 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.327566 kubelet[1956]: E0513 00:40:33.327556 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.327566 kubelet[1956]: W0513 00:40:33.327565 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.327633 kubelet[1956]: E0513 00:40:33.327578 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.327747 kubelet[1956]: E0513 00:40:33.327737 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.327747 kubelet[1956]: W0513 00:40:33.327747 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.327804 kubelet[1956]: E0513 00:40:33.327768 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.328051 kubelet[1956]: E0513 00:40:33.328039 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.328098 kubelet[1956]: W0513 00:40:33.328051 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.328098 kubelet[1956]: E0513 00:40:33.328063 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.328217 kubelet[1956]: E0513 00:40:33.328206 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.328217 kubelet[1956]: W0513 00:40:33.328216 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.328274 kubelet[1956]: E0513 00:40:33.328227 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.328363 kubelet[1956]: E0513 00:40:33.328353 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.328363 kubelet[1956]: W0513 00:40:33.328362 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.328426 kubelet[1956]: E0513 00:40:33.328369 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.328526 kubelet[1956]: E0513 00:40:33.328517 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.328558 kubelet[1956]: W0513 00:40:33.328529 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.328558 kubelet[1956]: E0513 00:40:33.328539 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.328947 kubelet[1956]: E0513 00:40:33.328936 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.328983 kubelet[1956]: W0513 00:40:33.328948 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.328983 kubelet[1956]: E0513 00:40:33.328959 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.329112 kubelet[1956]: E0513 00:40:33.329100 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:33.329112 kubelet[1956]: W0513 00:40:33.329111 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:33.329173 kubelet[1956]: E0513 00:40:33.329119 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:33.654046 env[1216]: time="2025-05-13T00:40:33.651539825Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:33.654046 env[1216]: time="2025-05-13T00:40:33.653625386Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:33.657385 env[1216]: time="2025-05-13T00:40:33.657345646Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:33.659476 env[1216]: time="2025-05-13T00:40:33.659427805Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:33.660131 env[1216]: time="2025-05-13T00:40:33.660099656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 13 00:40:33.662623 env[1216]: time="2025-05-13T00:40:33.662563027Z" level=info msg="CreateContainer within sandbox \"829f3bad892ab0d980fea32ee5d2fe7b31c8a254b9c4f36c515122b93977a77c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:40:33.672738 env[1216]: time="2025-05-13T00:40:33.672692268Z" level=info msg="CreateContainer within sandbox \"829f3bad892ab0d980fea32ee5d2fe7b31c8a254b9c4f36c515122b93977a77c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"aa308fcf881da1b4dfb67131b7226b2bd56d7e8689b0d5b3b4afd558e9835b4f\"" May 13 00:40:33.673227 env[1216]: time="2025-05-13T00:40:33.673202257Z" level=info msg="StartContainer for \"aa308fcf881da1b4dfb67131b7226b2bd56d7e8689b0d5b3b4afd558e9835b4f\"" May 13 00:40:33.695372 systemd[1]: Started cri-containerd-aa308fcf881da1b4dfb67131b7226b2bd56d7e8689b0d5b3b4afd558e9835b4f.scope. May 13 00:40:33.721000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2434 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:33.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161333038666366383831646131623464666236373133316237323236 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit: BPF prog-id=133 op=LOAD May 13 00:40:33.721000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2434 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:33.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161333038666366383831646131623464666236373133316237323236 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.721000 audit: BPF prog-id=134 op=LOAD May 13 00:40:33.721000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2434 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:33.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161333038666366383831646131623464666236373133316237323236 May 13 00:40:33.721000 audit: BPF prog-id=134 op=UNLOAD May 13 00:40:33.721000 audit: BPF prog-id=133 op=UNLOAD May 13 00:40:33.722000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.722000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.722000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.722000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.722000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.722000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.722000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.722000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.722000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.722000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:33.722000 audit: BPF prog-id=135 op=LOAD May 13 00:40:33.722000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2434 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:33.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161333038666366383831646131623464666236373133316237323236 May 13 00:40:33.738047 env[1216]: time="2025-05-13T00:40:33.737986485Z" level=info msg="StartContainer for \"aa308fcf881da1b4dfb67131b7226b2bd56d7e8689b0d5b3b4afd558e9835b4f\" returns successfully" May 13 00:40:33.754477 systemd[1]: cri-containerd-aa308fcf881da1b4dfb67131b7226b2bd56d7e8689b0d5b3b4afd558e9835b4f.scope: Deactivated successfully. May 13 00:40:33.760000 audit: BPF prog-id=135 op=UNLOAD May 13 00:40:33.817536 env[1216]: time="2025-05-13T00:40:33.817476569Z" level=info msg="shim disconnected" id=aa308fcf881da1b4dfb67131b7226b2bd56d7e8689b0d5b3b4afd558e9835b4f May 13 00:40:33.817536 env[1216]: time="2025-05-13T00:40:33.817536257Z" level=warning msg="cleaning up after shim disconnected" id=aa308fcf881da1b4dfb67131b7226b2bd56d7e8689b0d5b3b4afd558e9835b4f namespace=k8s.io May 13 00:40:33.817536 env[1216]: time="2025-05-13T00:40:33.817545338Z" level=info msg="cleaning up dead shim" May 13 00:40:33.827920 env[1216]: time="2025-05-13T00:40:33.827858324Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:40:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2588 runtime=io.containerd.runc.v2\n" May 13 00:40:34.200074 kubelet[1956]: E0513 00:40:34.200016 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnv28" podUID="7fb607c6-e13a-4bd1-be40-1ff0cacb38e0" May 13 00:40:34.245235 kubelet[1956]: E0513 00:40:34.245203 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:34.245682 kubelet[1956]: E0513 00:40:34.245518 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:34.246135 env[1216]: time="2025-05-13T00:40:34.246103400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:40:34.457715 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-aa308fcf881da1b4dfb67131b7226b2bd56d7e8689b0d5b3b4afd558e9835b4f-rootfs.mount: Deactivated successfully. May 13 00:40:35.246167 kubelet[1956]: E0513 00:40:35.246143 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:36.201465 kubelet[1956]: E0513 00:40:36.201404 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnv28" podUID="7fb607c6-e13a-4bd1-be40-1ff0cacb38e0" May 13 00:40:37.555203 env[1216]: time="2025-05-13T00:40:37.555161612Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:37.556578 env[1216]: time="2025-05-13T00:40:37.556540207Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:37.557984 env[1216]: time="2025-05-13T00:40:37.557946845Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:37.559336 env[1216]: time="2025-05-13T00:40:37.559312478Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:37.559854 env[1216]: time="2025-05-13T00:40:37.559829456Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 13 00:40:37.566180 env[1216]: time="2025-05-13T00:40:37.566140524Z" level=info msg="CreateContainer within sandbox \"829f3bad892ab0d980fea32ee5d2fe7b31c8a254b9c4f36c515122b93977a77c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:40:37.581352 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1042548241.mount: Deactivated successfully. May 13 00:40:37.584621 env[1216]: time="2025-05-13T00:40:37.584586393Z" level=info msg="CreateContainer within sandbox \"829f3bad892ab0d980fea32ee5d2fe7b31c8a254b9c4f36c515122b93977a77c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e0c7e3997839a0eadd105a0b1593938d672bb8f90b04f9779b477f6f51624939\"" May 13 00:40:37.585206 env[1216]: time="2025-05-13T00:40:37.585166138Z" level=info msg="StartContainer for \"e0c7e3997839a0eadd105a0b1593938d672bb8f90b04f9779b477f6f51624939\"" May 13 00:40:37.606451 systemd[1]: Started cri-containerd-e0c7e3997839a0eadd105a0b1593938d672bb8f90b04f9779b477f6f51624939.scope. May 13 00:40:37.643000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.646113 kernel: kauditd_printk_skb: 229 callbacks suppressed May 13 00:40:37.646168 kernel: audit: type=1400 audit(1747096837.643:1007): avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.643000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2434 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:37.651883 kernel: audit: type=1300 audit(1747096837.643:1007): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2434 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:37.651946 kernel: audit: type=1327 audit(1747096837.643:1007): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633765333939373833396130656164643130356130623135393339 May 13 00:40:37.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633765333939373833396130656164643130356130623135393339 May 13 00:40:37.643000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.657245 kernel: audit: type=1400 audit(1747096837.643:1008): avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.657310 kernel: audit: type=1400 audit(1747096837.643:1008): avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.643000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.643000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.662023 kernel: audit: type=1400 audit(1747096837.643:1008): avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.643000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.664476 kernel: audit: type=1400 audit(1747096837.643:1008): avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.664571 kernel: audit: type=1400 audit(1747096837.643:1008): avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.643000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.643000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.669229 kernel: audit: type=1400 audit(1747096837.643:1008): avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.643000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.673127 kernel: audit: type=1400 audit(1747096837.643:1008): avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.643000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.643000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.643000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.643000 audit: BPF prog-id=136 op=LOAD May 13 00:40:37.643000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2434 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:37.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633765333939373833396130656164643130356130623135393339 May 13 00:40:37.644000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.644000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.644000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.644000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.644000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.644000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.644000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.644000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.644000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.644000 audit: BPF prog-id=137 op=LOAD May 13 00:40:37.644000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2434 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:37.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633765333939373833396130656164643130356130623135393339 May 13 00:40:37.646000 audit: BPF prog-id=137 op=UNLOAD May 13 00:40:37.646000 audit: BPF prog-id=136 op=UNLOAD May 13 00:40:37.646000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.646000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.646000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.646000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.646000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.646000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.646000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.646000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.646000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.646000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:37.646000 audit: BPF prog-id=138 op=LOAD May 13 00:40:37.646000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2434 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:37.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633765333939373833396130656164643130356130623135393339 May 13 00:40:37.676996 env[1216]: time="2025-05-13T00:40:37.676954993Z" level=info msg="StartContainer for \"e0c7e3997839a0eadd105a0b1593938d672bb8f90b04f9779b477f6f51624939\" returns successfully" May 13 00:40:38.200263 kubelet[1956]: E0513 00:40:38.200199 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnv28" podUID="7fb607c6-e13a-4bd1-be40-1ff0cacb38e0" May 13 00:40:38.260311 kubelet[1956]: E0513 00:40:38.260272 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:38.279267 env[1216]: time="2025-05-13T00:40:38.279206953Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:40:38.282402 systemd[1]: cri-containerd-e0c7e3997839a0eadd105a0b1593938d672bb8f90b04f9779b477f6f51624939.scope: Deactivated successfully. May 13 00:40:38.287000 audit: BPF prog-id=138 op=UNLOAD May 13 00:40:38.328084 env[1216]: time="2025-05-13T00:40:38.328026079Z" level=info msg="shim disconnected" id=e0c7e3997839a0eadd105a0b1593938d672bb8f90b04f9779b477f6f51624939 May 13 00:40:38.328084 env[1216]: time="2025-05-13T00:40:38.328075124Z" level=warning msg="cleaning up after shim disconnected" id=e0c7e3997839a0eadd105a0b1593938d672bb8f90b04f9779b477f6f51624939 namespace=k8s.io May 13 00:40:38.328084 env[1216]: time="2025-05-13T00:40:38.328089045Z" level=info msg="cleaning up dead shim" May 13 00:40:38.335509 env[1216]: time="2025-05-13T00:40:38.335448796Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:40:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2655 runtime=io.containerd.runc.v2\n" May 13 00:40:38.385658 kubelet[1956]: I0513 00:40:38.385619 1956 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 13 00:40:38.419641 systemd[1]: Created slice kubepods-besteffort-podc71d13a4_e163_400c_ad03_9388338c0caa.slice. May 13 00:40:38.424231 systemd[1]: Created slice kubepods-burstable-pod7acf1133_f126_4ff5_9211_a424f15ef5ea.slice. May 13 00:40:38.428424 systemd[1]: Created slice kubepods-besteffort-podc3d6465d_07e8_4406_9026_a105e339cb72.slice. May 13 00:40:38.433940 systemd[1]: Created slice kubepods-burstable-pod29fc948b_1295_4736_8ba8_8d4160e63002.slice. May 13 00:40:38.441137 systemd[1]: Created slice kubepods-besteffort-pode75667cf_26ee_4cdb_a7fe_64c643e5e0f4.slice. May 13 00:40:38.477341 kubelet[1956]: I0513 00:40:38.477226 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c71d13a4-e163-400c-ad03-9388338c0caa-calico-apiserver-certs\") pod \"calico-apiserver-65cf854b4-rlcz6\" (UID: \"c71d13a4-e163-400c-ad03-9388338c0caa\") " pod="calico-apiserver/calico-apiserver-65cf854b4-rlcz6" May 13 00:40:38.477341 kubelet[1956]: I0513 00:40:38.477272 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/29fc948b-1295-4736-8ba8-8d4160e63002-config-volume\") pod \"coredns-668d6bf9bc-dkt4t\" (UID: \"29fc948b-1295-4736-8ba8-8d4160e63002\") " pod="kube-system/coredns-668d6bf9bc-dkt4t" May 13 00:40:38.477341 kubelet[1956]: I0513 00:40:38.477294 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jhbb2\" (UniqueName: \"kubernetes.io/projected/c3d6465d-07e8-4406-9026-a105e339cb72-kube-api-access-jhbb2\") pod \"calico-kube-controllers-644fd5b575-vcg45\" (UID: \"c3d6465d-07e8-4406-9026-a105e339cb72\") " pod="calico-system/calico-kube-controllers-644fd5b575-vcg45" May 13 00:40:38.477341 kubelet[1956]: I0513 00:40:38.477313 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e75667cf-26ee-4cdb-a7fe-64c643e5e0f4-calico-apiserver-certs\") pod \"calico-apiserver-65cf854b4-kcm5m\" (UID: \"e75667cf-26ee-4cdb-a7fe-64c643e5e0f4\") " pod="calico-apiserver/calico-apiserver-65cf854b4-kcm5m" May 13 00:40:38.477341 kubelet[1956]: I0513 00:40:38.477329 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qdjpk\" (UniqueName: \"kubernetes.io/projected/c71d13a4-e163-400c-ad03-9388338c0caa-kube-api-access-qdjpk\") pod \"calico-apiserver-65cf854b4-rlcz6\" (UID: \"c71d13a4-e163-400c-ad03-9388338c0caa\") " pod="calico-apiserver/calico-apiserver-65cf854b4-rlcz6" May 13 00:40:38.477639 kubelet[1956]: I0513 00:40:38.477343 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jcvtp\" (UniqueName: \"kubernetes.io/projected/29fc948b-1295-4736-8ba8-8d4160e63002-kube-api-access-jcvtp\") pod \"coredns-668d6bf9bc-dkt4t\" (UID: \"29fc948b-1295-4736-8ba8-8d4160e63002\") " pod="kube-system/coredns-668d6bf9bc-dkt4t" May 13 00:40:38.477639 kubelet[1956]: I0513 00:40:38.477359 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c3d6465d-07e8-4406-9026-a105e339cb72-tigera-ca-bundle\") pod \"calico-kube-controllers-644fd5b575-vcg45\" (UID: \"c3d6465d-07e8-4406-9026-a105e339cb72\") " pod="calico-system/calico-kube-controllers-644fd5b575-vcg45" May 13 00:40:38.477639 kubelet[1956]: I0513 00:40:38.477404 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/7acf1133-f126-4ff5-9211-a424f15ef5ea-config-volume\") pod \"coredns-668d6bf9bc-d98p4\" (UID: \"7acf1133-f126-4ff5-9211-a424f15ef5ea\") " pod="kube-system/coredns-668d6bf9bc-d98p4" May 13 00:40:38.477639 kubelet[1956]: I0513 00:40:38.477455 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b24fc\" (UniqueName: \"kubernetes.io/projected/7acf1133-f126-4ff5-9211-a424f15ef5ea-kube-api-access-b24fc\") pod \"coredns-668d6bf9bc-d98p4\" (UID: \"7acf1133-f126-4ff5-9211-a424f15ef5ea\") " pod="kube-system/coredns-668d6bf9bc-d98p4" May 13 00:40:38.477639 kubelet[1956]: I0513 00:40:38.477517 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-65mk6\" (UniqueName: \"kubernetes.io/projected/e75667cf-26ee-4cdb-a7fe-64c643e5e0f4-kube-api-access-65mk6\") pod \"calico-apiserver-65cf854b4-kcm5m\" (UID: \"e75667cf-26ee-4cdb-a7fe-64c643e5e0f4\") " pod="calico-apiserver/calico-apiserver-65cf854b4-kcm5m" May 13 00:40:38.577587 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e0c7e3997839a0eadd105a0b1593938d672bb8f90b04f9779b477f6f51624939-rootfs.mount: Deactivated successfully. May 13 00:40:38.724215 env[1216]: time="2025-05-13T00:40:38.724166521Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65cf854b4-rlcz6,Uid:c71d13a4-e163-400c-ad03-9388338c0caa,Namespace:calico-apiserver,Attempt:0,}" May 13 00:40:38.730134 kubelet[1956]: E0513 00:40:38.730020 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:38.730768 env[1216]: time="2025-05-13T00:40:38.730719545Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d98p4,Uid:7acf1133-f126-4ff5-9211-a424f15ef5ea,Namespace:kube-system,Attempt:0,}" May 13 00:40:38.731353 env[1216]: time="2025-05-13T00:40:38.731314169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-644fd5b575-vcg45,Uid:c3d6465d-07e8-4406-9026-a105e339cb72,Namespace:calico-system,Attempt:0,}" May 13 00:40:38.739646 kubelet[1956]: E0513 00:40:38.739610 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:38.740122 env[1216]: time="2025-05-13T00:40:38.740070989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-dkt4t,Uid:29fc948b-1295-4736-8ba8-8d4160e63002,Namespace:kube-system,Attempt:0,}" May 13 00:40:38.743718 env[1216]: time="2025-05-13T00:40:38.743677977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65cf854b4-kcm5m,Uid:e75667cf-26ee-4cdb-a7fe-64c643e5e0f4,Namespace:calico-apiserver,Attempt:0,}" May 13 00:40:38.971644 env[1216]: time="2025-05-13T00:40:38.971556821Z" level=error msg="Failed to destroy network for sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.972352 env[1216]: time="2025-05-13T00:40:38.972305981Z" level=error msg="encountered an error cleaning up failed sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.972542 env[1216]: time="2025-05-13T00:40:38.972476239Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d98p4,Uid:7acf1133-f126-4ff5-9211-a424f15ef5ea,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.975144 kubelet[1956]: E0513 00:40:38.974999 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.977245 kubelet[1956]: E0513 00:40:38.976878 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-d98p4" May 13 00:40:38.977245 kubelet[1956]: E0513 00:40:38.976941 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-d98p4" May 13 00:40:38.977245 kubelet[1956]: E0513 00:40:38.976994 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-d98p4_kube-system(7acf1133-f126-4ff5-9211-a424f15ef5ea)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-d98p4_kube-system(7acf1133-f126-4ff5-9211-a424f15ef5ea)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-d98p4" podUID="7acf1133-f126-4ff5-9211-a424f15ef5ea" May 13 00:40:38.978395 env[1216]: time="2025-05-13T00:40:38.978344150Z" level=error msg="Failed to destroy network for sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.979024 env[1216]: time="2025-05-13T00:40:38.978983859Z" level=error msg="encountered an error cleaning up failed sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.979122 env[1216]: time="2025-05-13T00:40:38.979091310Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-644fd5b575-vcg45,Uid:c3d6465d-07e8-4406-9026-a105e339cb72,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.979484 kubelet[1956]: E0513 00:40:38.979311 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.979484 kubelet[1956]: E0513 00:40:38.979379 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-644fd5b575-vcg45" May 13 00:40:38.979484 kubelet[1956]: E0513 00:40:38.979397 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-644fd5b575-vcg45" May 13 00:40:38.979787 kubelet[1956]: E0513 00:40:38.979437 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-644fd5b575-vcg45_calico-system(c3d6465d-07e8-4406-9026-a105e339cb72)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-644fd5b575-vcg45_calico-system(c3d6465d-07e8-4406-9026-a105e339cb72)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-644fd5b575-vcg45" podUID="c3d6465d-07e8-4406-9026-a105e339cb72" May 13 00:40:38.985756 env[1216]: time="2025-05-13T00:40:38.985642414Z" level=error msg="Failed to destroy network for sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.987230 env[1216]: time="2025-05-13T00:40:38.987181579Z" level=error msg="encountered an error cleaning up failed sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.987415 env[1216]: time="2025-05-13T00:40:38.987382041Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65cf854b4-rlcz6,Uid:c71d13a4-e163-400c-ad03-9388338c0caa,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.988155 kubelet[1956]: E0513 00:40:38.987801 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.988155 kubelet[1956]: E0513 00:40:38.987858 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65cf854b4-rlcz6" May 13 00:40:38.988155 kubelet[1956]: E0513 00:40:38.987878 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65cf854b4-rlcz6" May 13 00:40:38.988297 kubelet[1956]: E0513 00:40:38.987915 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-65cf854b4-rlcz6_calico-apiserver(c71d13a4-e163-400c-ad03-9388338c0caa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-65cf854b4-rlcz6_calico-apiserver(c71d13a4-e163-400c-ad03-9388338c0caa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65cf854b4-rlcz6" podUID="c71d13a4-e163-400c-ad03-9388338c0caa" May 13 00:40:38.988545 env[1216]: time="2025-05-13T00:40:38.988473598Z" level=error msg="Failed to destroy network for sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.988976 env[1216]: time="2025-05-13T00:40:38.988939128Z" level=error msg="encountered an error cleaning up failed sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.989104 env[1216]: time="2025-05-13T00:40:38.989073863Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65cf854b4-kcm5m,Uid:e75667cf-26ee-4cdb-a7fe-64c643e5e0f4,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.989602 kubelet[1956]: E0513 00:40:38.989381 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.989602 kubelet[1956]: E0513 00:40:38.989429 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65cf854b4-kcm5m" May 13 00:40:38.989602 kubelet[1956]: E0513 00:40:38.989449 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65cf854b4-kcm5m" May 13 00:40:38.989777 kubelet[1956]: E0513 00:40:38.989484 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-65cf854b4-kcm5m_calico-apiserver(e75667cf-26ee-4cdb-a7fe-64c643e5e0f4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-65cf854b4-kcm5m_calico-apiserver(e75667cf-26ee-4cdb-a7fe-64c643e5e0f4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65cf854b4-kcm5m" podUID="e75667cf-26ee-4cdb-a7fe-64c643e5e0f4" May 13 00:40:38.993592 env[1216]: time="2025-05-13T00:40:38.993522101Z" level=error msg="Failed to destroy network for sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.993906 env[1216]: time="2025-05-13T00:40:38.993874819Z" level=error msg="encountered an error cleaning up failed sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.993958 env[1216]: time="2025-05-13T00:40:38.993925824Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-dkt4t,Uid:29fc948b-1295-4736-8ba8-8d4160e63002,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.994105 kubelet[1956]: E0513 00:40:38.994078 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:38.994149 kubelet[1956]: E0513 00:40:38.994126 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-dkt4t" May 13 00:40:38.994176 kubelet[1956]: E0513 00:40:38.994146 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-dkt4t" May 13 00:40:38.994202 kubelet[1956]: E0513 00:40:38.994181 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-dkt4t_kube-system(29fc948b-1295-4736-8ba8-8d4160e63002)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-dkt4t_kube-system(29fc948b-1295-4736-8ba8-8d4160e63002)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-dkt4t" podUID="29fc948b-1295-4736-8ba8-8d4160e63002" May 13 00:40:39.260447 kubelet[1956]: I0513 00:40:39.260340 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:40:39.261454 env[1216]: time="2025-05-13T00:40:39.261206312Z" level=info msg="StopPodSandbox for \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\"" May 13 00:40:39.262776 kubelet[1956]: I0513 00:40:39.262746 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:40:39.263203 env[1216]: time="2025-05-13T00:40:39.263167434Z" level=info msg="StopPodSandbox for \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\"" May 13 00:40:39.264613 kubelet[1956]: I0513 00:40:39.264582 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:40:39.265093 env[1216]: time="2025-05-13T00:40:39.265046987Z" level=info msg="StopPodSandbox for \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\"" May 13 00:40:39.266028 kubelet[1956]: I0513 00:40:39.265992 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:40:39.266524 env[1216]: time="2025-05-13T00:40:39.266462973Z" level=info msg="StopPodSandbox for \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\"" May 13 00:40:39.268334 kubelet[1956]: E0513 00:40:39.268305 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:39.269558 env[1216]: time="2025-05-13T00:40:39.269526009Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:40:39.270067 kubelet[1956]: I0513 00:40:39.270042 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:40:39.270539 env[1216]: time="2025-05-13T00:40:39.270511590Z" level=info msg="StopPodSandbox for \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\"" May 13 00:40:39.315488 env[1216]: time="2025-05-13T00:40:39.315428057Z" level=error msg="StopPodSandbox for \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\" failed" error="failed to destroy network for sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:39.315723 kubelet[1956]: E0513 00:40:39.315673 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:40:39.315817 kubelet[1956]: E0513 00:40:39.315741 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c"} May 13 00:40:39.315817 kubelet[1956]: E0513 00:40:39.315800 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c3d6465d-07e8-4406-9026-a105e339cb72\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:40:39.315938 kubelet[1956]: E0513 00:40:39.315821 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c3d6465d-07e8-4406-9026-a105e339cb72\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-644fd5b575-vcg45" podUID="c3d6465d-07e8-4406-9026-a105e339cb72" May 13 00:40:39.323038 env[1216]: time="2025-05-13T00:40:39.322978315Z" level=error msg="StopPodSandbox for \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\" failed" error="failed to destroy network for sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:39.323522 kubelet[1956]: E0513 00:40:39.323345 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:40:39.323522 kubelet[1956]: E0513 00:40:39.323407 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2"} May 13 00:40:39.323522 kubelet[1956]: E0513 00:40:39.323440 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e75667cf-26ee-4cdb-a7fe-64c643e5e0f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:40:39.323522 kubelet[1956]: E0513 00:40:39.323477 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e75667cf-26ee-4cdb-a7fe-64c643e5e0f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65cf854b4-kcm5m" podUID="e75667cf-26ee-4cdb-a7fe-64c643e5e0f4" May 13 00:40:39.328644 env[1216]: time="2025-05-13T00:40:39.328547089Z" level=error msg="StopPodSandbox for \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\" failed" error="failed to destroy network for sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:39.329211 kubelet[1956]: E0513 00:40:39.329036 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:40:39.329211 kubelet[1956]: E0513 00:40:39.329103 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef"} May 13 00:40:39.329211 kubelet[1956]: E0513 00:40:39.329157 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c71d13a4-e163-400c-ad03-9388338c0caa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:40:39.329211 kubelet[1956]: E0513 00:40:39.329182 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c71d13a4-e163-400c-ad03-9388338c0caa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65cf854b4-rlcz6" podUID="c71d13a4-e163-400c-ad03-9388338c0caa" May 13 00:40:39.333236 env[1216]: time="2025-05-13T00:40:39.333170925Z" level=error msg="StopPodSandbox for \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\" failed" error="failed to destroy network for sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:39.333448 kubelet[1956]: E0513 00:40:39.333402 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:40:39.333540 kubelet[1956]: E0513 00:40:39.333457 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597"} May 13 00:40:39.333540 kubelet[1956]: E0513 00:40:39.333513 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7acf1133-f126-4ff5-9211-a424f15ef5ea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:40:39.333663 kubelet[1956]: E0513 00:40:39.333536 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7acf1133-f126-4ff5-9211-a424f15ef5ea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-d98p4" podUID="7acf1133-f126-4ff5-9211-a424f15ef5ea" May 13 00:40:39.335098 env[1216]: time="2025-05-13T00:40:39.335040758Z" level=error msg="StopPodSandbox for \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\" failed" error="failed to destroy network for sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:39.335340 kubelet[1956]: E0513 00:40:39.335313 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:40:39.335405 kubelet[1956]: E0513 00:40:39.335345 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d"} May 13 00:40:39.335405 kubelet[1956]: E0513 00:40:39.335367 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"29fc948b-1295-4736-8ba8-8d4160e63002\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:40:39.335405 kubelet[1956]: E0513 00:40:39.335384 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"29fc948b-1295-4736-8ba8-8d4160e63002\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-dkt4t" podUID="29fc948b-1295-4736-8ba8-8d4160e63002" May 13 00:40:40.204371 systemd[1]: Created slice kubepods-besteffort-pod7fb607c6_e13a_4bd1_be40_1ff0cacb38e0.slice. May 13 00:40:40.206162 env[1216]: time="2025-05-13T00:40:40.206120164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wnv28,Uid:7fb607c6-e13a-4bd1-be40-1ff0cacb38e0,Namespace:calico-system,Attempt:0,}" May 13 00:40:40.263211 env[1216]: time="2025-05-13T00:40:40.263158324Z" level=error msg="Failed to destroy network for sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:40.266084 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955-shm.mount: Deactivated successfully. May 13 00:40:40.266926 env[1216]: time="2025-05-13T00:40:40.266743958Z" level=error msg="encountered an error cleaning up failed sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:40.266926 env[1216]: time="2025-05-13T00:40:40.266802284Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wnv28,Uid:7fb607c6-e13a-4bd1-be40-1ff0cacb38e0,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:40.267156 kubelet[1956]: E0513 00:40:40.267121 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:40.267384 kubelet[1956]: E0513 00:40:40.267174 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wnv28" May 13 00:40:40.267384 kubelet[1956]: E0513 00:40:40.267200 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wnv28" May 13 00:40:40.267384 kubelet[1956]: E0513 00:40:40.267237 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wnv28_calico-system(7fb607c6-e13a-4bd1-be40-1ff0cacb38e0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wnv28_calico-system(7fb607c6-e13a-4bd1-be40-1ff0cacb38e0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wnv28" podUID="7fb607c6-e13a-4bd1-be40-1ff0cacb38e0" May 13 00:40:40.272004 kubelet[1956]: I0513 00:40:40.271984 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:40:40.272717 env[1216]: time="2025-05-13T00:40:40.272691066Z" level=info msg="StopPodSandbox for \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\"" May 13 00:40:40.319903 env[1216]: time="2025-05-13T00:40:40.319853129Z" level=error msg="StopPodSandbox for \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\" failed" error="failed to destroy network for sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:40.320256 kubelet[1956]: E0513 00:40:40.320215 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:40:40.320334 kubelet[1956]: E0513 00:40:40.320271 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955"} May 13 00:40:40.320334 kubelet[1956]: E0513 00:40:40.320305 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7fb607c6-e13a-4bd1-be40-1ff0cacb38e0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:40:40.320334 kubelet[1956]: E0513 00:40:40.320324 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7fb607c6-e13a-4bd1-be40-1ff0cacb38e0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wnv28" podUID="7fb607c6-e13a-4bd1-be40-1ff0cacb38e0" May 13 00:40:42.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.136:22-10.0.0.1:58540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:42.546609 systemd[1]: Started sshd@7-10.0.0.136:22-10.0.0.1:58540.service. May 13 00:40:42.588000 audit[3044]: USER_ACCT pid=3044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:42.589637 sshd[3044]: Accepted publickey for core from 10.0.0.1 port 58540 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:42.589000 audit[3044]: CRED_ACQ pid=3044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:42.589000 audit[3044]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffec607f0 a2=3 a3=1 items=0 ppid=1 pid=3044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.589000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:40:42.590967 sshd[3044]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:42.594580 systemd-logind[1204]: New session 8 of user core. May 13 00:40:42.595431 systemd[1]: Started session-8.scope. May 13 00:40:42.598000 audit[3044]: USER_START pid=3044 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:42.599000 audit[3046]: CRED_ACQ pid=3046 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:42.765705 sshd[3044]: pam_unix(sshd:session): session closed for user core May 13 00:40:42.766000 audit[3044]: USER_END pid=3044 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:42.768301 systemd[1]: sshd@7-10.0.0.136:22-10.0.0.1:58540.service: Deactivated successfully. May 13 00:40:42.769020 systemd[1]: session-8.scope: Deactivated successfully. May 13 00:40:42.770812 kernel: kauditd_printk_skb: 42 callbacks suppressed May 13 00:40:42.770897 kernel: audit: type=1106 audit(1747096842.766:1020): pid=3044 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:42.770927 kernel: audit: type=1104 audit(1747096842.766:1021): pid=3044 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:42.766000 audit[3044]: CRED_DISP pid=3044 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:42.771932 systemd-logind[1204]: Session 8 logged out. Waiting for processes to exit. May 13 00:40:42.772802 systemd-logind[1204]: Removed session 8. May 13 00:40:42.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.136:22-10.0.0.1:58540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:42.776030 kernel: audit: type=1131 audit(1747096842.766:1022): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.136:22-10.0.0.1:58540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:44.300386 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount344266785.mount: Deactivated successfully. May 13 00:40:44.456146 env[1216]: time="2025-05-13T00:40:44.456094433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:44.457348 env[1216]: time="2025-05-13T00:40:44.457313657Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:44.458746 env[1216]: time="2025-05-13T00:40:44.458716856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:44.460033 env[1216]: time="2025-05-13T00:40:44.459991244Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:44.460395 env[1216]: time="2025-05-13T00:40:44.460355794Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 13 00:40:44.475959 env[1216]: time="2025-05-13T00:40:44.475907632Z" level=info msg="CreateContainer within sandbox \"829f3bad892ab0d980fea32ee5d2fe7b31c8a254b9c4f36c515122b93977a77c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:40:44.492106 env[1216]: time="2025-05-13T00:40:44.492069081Z" level=info msg="CreateContainer within sandbox \"829f3bad892ab0d980fea32ee5d2fe7b31c8a254b9c4f36c515122b93977a77c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0209fcb50b6979008ac375fc7097ae4ea7354b24873671c78cdfd6046161940f\"" May 13 00:40:44.492858 env[1216]: time="2025-05-13T00:40:44.492816824Z" level=info msg="StartContainer for \"0209fcb50b6979008ac375fc7097ae4ea7354b24873671c78cdfd6046161940f\"" May 13 00:40:44.506839 systemd[1]: Started cri-containerd-0209fcb50b6979008ac375fc7097ae4ea7354b24873671c78cdfd6046161940f.scope. May 13 00:40:44.549000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2434 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:44.555474 kernel: audit: type=1400 audit(1747096844.549:1023): avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.555550 kernel: audit: type=1300 audit(1747096844.549:1023): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2434 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:44.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303966636235306236393739303038616333373566633730393761 May 13 00:40:44.559159 kernel: audit: type=1327 audit(1747096844.549:1023): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303966636235306236393739303038616333373566633730393761 May 13 00:40:44.559238 kernel: audit: type=1400 audit(1747096844.549:1024): avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.563962 kernel: audit: type=1400 audit(1747096844.549:1024): avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.566382 kernel: audit: type=1400 audit(1747096844.549:1024): avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.568941 kernel: audit: type=1400 audit(1747096844.549:1024): avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.549000 audit: BPF prog-id=139 op=LOAD May 13 00:40:44.549000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2434 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:44.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303966636235306236393739303038616333373566633730393761 May 13 00:40:44.551000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.551000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.551000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.551000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.551000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.551000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.551000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.551000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.551000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.551000 audit: BPF prog-id=140 op=LOAD May 13 00:40:44.551000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2434 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:44.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303966636235306236393739303038616333373566633730393761 May 13 00:40:44.555000 audit: BPF prog-id=140 op=UNLOAD May 13 00:40:44.555000 audit: BPF prog-id=139 op=UNLOAD May 13 00:40:44.555000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.555000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.555000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.555000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.555000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.555000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.555000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.555000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.555000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.555000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:44.555000 audit: BPF prog-id=141 op=LOAD May 13 00:40:44.555000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2434 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:44.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303966636235306236393739303038616333373566633730393761 May 13 00:40:44.584713 env[1216]: time="2025-05-13T00:40:44.584668244Z" level=info msg="StartContainer for \"0209fcb50b6979008ac375fc7097ae4ea7354b24873671c78cdfd6046161940f\" returns successfully" May 13 00:40:44.752218 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:40:44.752346 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:40:45.286889 kubelet[1956]: E0513 00:40:45.286822 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:45.303472 kubelet[1956]: I0513 00:40:45.303399 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-zmzx8" podStartSLOduration=2.357007329 podStartE2EDuration="15.303383894s" podCreationTimestamp="2025-05-13 00:40:30 +0000 UTC" firstStartedPulling="2025-05-13 00:40:31.515240976 +0000 UTC m=+16.413444325" lastFinishedPulling="2025-05-13 00:40:44.461617541 +0000 UTC m=+29.359820890" observedRunningTime="2025-05-13 00:40:45.303294207 +0000 UTC m=+30.201497556" watchObservedRunningTime="2025-05-13 00:40:45.303383894 +0000 UTC m=+30.201587243" May 13 00:40:45.981000 audit[3209]: AVC avc: denied { write } for pid=3209 comm="tee" name="fd" dev="proc" ino=17391 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:45.981000 audit[3209]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd1563a2e a2=241 a3=1b6 items=1 ppid=3174 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.981000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:40:45.981000 audit: PATH item=0 name="/dev/fd/63" inode=18164 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:45.981000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:45.985000 audit[3211]: AVC avc: denied { write } for pid=3211 comm="tee" name="fd" dev="proc" ino=17395 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:45.985000 audit[3211]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff2339a2e a2=241 a3=1b6 items=1 ppid=3170 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.985000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:40:45.985000 audit: PATH item=0 name="/dev/fd/63" inode=17386 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:45.985000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:45.990000 audit[3228]: AVC avc: denied { write } for pid=3228 comm="tee" name="fd" dev="proc" ino=19240 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:45.990000 audit[3228]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff2c9ba2f a2=241 a3=1b6 items=1 ppid=3159 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.990000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:40:45.990000 audit[3214]: AVC avc: denied { write } for pid=3214 comm="tee" name="fd" dev="proc" ino=18172 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:45.990000 audit[3214]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd8b04a2e a2=241 a3=1b6 items=1 ppid=3160 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.990000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:40:45.990000 audit: PATH item=0 name="/dev/fd/63" inode=18165 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:45.990000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:45.993000 audit[3217]: AVC avc: denied { write } for pid=3217 comm="tee" name="fd" dev="proc" ino=17399 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:45.993000 audit[3217]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe9cc7a30 a2=241 a3=1b6 items=1 ppid=3161 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.993000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:40:45.993000 audit: PATH item=0 name="/dev/fd/63" inode=16361 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:45.993000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:45.990000 audit: PATH item=0 name="/dev/fd/63" inode=18168 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:45.990000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:46.001000 audit[3230]: AVC avc: denied { write } for pid=3230 comm="tee" name="fd" dev="proc" ino=17401 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:46.001000 audit[3230]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa59ba1f a2=241 a3=1b6 items=1 ppid=3167 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.001000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:40:46.001000 audit: PATH item=0 name="/dev/fd/63" inode=18169 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:46.001000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:46.009000 audit[3240]: AVC avc: denied { write } for pid=3240 comm="tee" name="fd" dev="proc" ino=18180 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:46.009000 audit[3240]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffde2b3a1e a2=241 a3=1b6 items=1 ppid=3162 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.009000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:40:46.009000 audit: PATH item=0 name="/dev/fd/63" inode=16365 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:46.009000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:46.115000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.115000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.115000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.115000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.115000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.115000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.115000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.115000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.115000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.115000 audit: BPF prog-id=142 op=LOAD May 13 00:40:46.115000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe5f73bb8 a2=98 a3=ffffe5f73ba8 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.116000 audit: BPF prog-id=142 op=UNLOAD May 13 00:40:46.116000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit: BPF prog-id=143 op=LOAD May 13 00:40:46.116000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe5f73848 a2=74 a3=95 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.116000 audit: BPF prog-id=143 op=UNLOAD May 13 00:40:46.116000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.116000 audit: BPF prog-id=144 op=LOAD May 13 00:40:46.116000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe5f738a8 a2=94 a3=2 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.116000 audit: BPF prog-id=144 op=UNLOAD May 13 00:40:46.209000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.209000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.209000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.209000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.209000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.209000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.209000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.209000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.209000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.209000 audit: BPF prog-id=145 op=LOAD May 13 00:40:46.209000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe5f73868 a2=40 a3=ffffe5f73898 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.209000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.210000 audit: BPF prog-id=145 op=UNLOAD May 13 00:40:46.210000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.210000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe5f73980 a2=50 a3=0 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe5f738d8 a2=28 a3=ffffe5f73a08 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe5f73908 a2=28 a3=ffffe5f73a38 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe5f737b8 a2=28 a3=ffffe5f738e8 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe5f73928 a2=28 a3=ffffe5f73a58 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe5f73908 a2=28 a3=ffffe5f73a38 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe5f738f8 a2=28 a3=ffffe5f73a28 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe5f73928 a2=28 a3=ffffe5f73a58 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe5f73908 a2=28 a3=ffffe5f73a38 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe5f73928 a2=28 a3=ffffe5f73a58 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe5f738f8 a2=28 a3=ffffe5f73a28 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe5f73978 a2=28 a3=ffffe5f73ab8 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe5f736b0 a2=50 a3=0 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit: BPF prog-id=146 op=LOAD May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe5f736b8 a2=94 a3=5 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit: BPF prog-id=146 op=UNLOAD May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe5f737c0 a2=50 a3=0 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe5f73908 a2=4 a3=3 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.218000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:46.218000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe5f738e8 a2=94 a3=6 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.218000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.219000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:46.219000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe5f730b8 a2=94 a3=83 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.219000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.219000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.219000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:46.219000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe5f730b8 a2=94 a3=83 items=0 ppid=3175 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.219000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit: BPF prog-id=147 op=LOAD May 13 00:40:46.230000 audit[3283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd96f158 a2=98 a3=ffffdd96f148 items=0 ppid=3175 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.230000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:40:46.230000 audit: BPF prog-id=147 op=UNLOAD May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit: BPF prog-id=148 op=LOAD May 13 00:40:46.230000 audit[3283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd96f008 a2=74 a3=95 items=0 ppid=3175 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.230000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:40:46.230000 audit: BPF prog-id=148 op=UNLOAD May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.230000 audit: BPF prog-id=149 op=LOAD May 13 00:40:46.230000 audit[3283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd96f038 a2=40 a3=ffffdd96f068 items=0 ppid=3175 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.230000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:40:46.230000 audit: BPF prog-id=149 op=UNLOAD May 13 00:40:46.278874 systemd-networkd[1045]: vxlan.calico: Link UP May 13 00:40:46.278883 systemd-networkd[1045]: vxlan.calico: Gained carrier May 13 00:40:46.290878 kubelet[1956]: E0513 00:40:46.290684 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit: BPF prog-id=150 op=LOAD May 13 00:40:46.312000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc1785798 a2=98 a3=ffffc1785788 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.312000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.312000 audit: BPF prog-id=150 op=UNLOAD May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit: BPF prog-id=151 op=LOAD May 13 00:40:46.312000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc1785478 a2=74 a3=95 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.312000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.312000 audit: BPF prog-id=151 op=UNLOAD May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit: BPF prog-id=152 op=LOAD May 13 00:40:46.312000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc17854d8 a2=94 a3=2 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.312000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.312000 audit: BPF prog-id=152 op=UNLOAD May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc1785508 a2=28 a3=ffffc1785638 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.312000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc1785538 a2=28 a3=ffffc1785668 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.312000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc17853e8 a2=28 a3=ffffc1785518 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.312000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc1785558 a2=28 a3=ffffc1785688 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.312000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc1785538 a2=28 a3=ffffc1785668 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.312000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.312000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.312000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc1785528 a2=28 a3=ffffc1785658 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.312000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc1785558 a2=28 a3=ffffc1785688 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc1785538 a2=28 a3=ffffc1785668 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc1785558 a2=28 a3=ffffc1785688 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc1785528 a2=28 a3=ffffc1785658 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc17855a8 a2=28 a3=ffffc17856e8 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit: BPF prog-id=153 op=LOAD May 13 00:40:46.313000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc17853c8 a2=40 a3=ffffc17853f8 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.313000 audit: BPF prog-id=153 op=UNLOAD May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc17853f0 a2=50 a3=0 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffc17853f0 a2=50 a3=0 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit: BPF prog-id=154 op=LOAD May 13 00:40:46.313000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc1784b58 a2=94 a3=2 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.313000 audit: BPF prog-id=154 op=UNLOAD May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.313000 audit[3322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc1784ce8 a2=94 a3=30 items=0 ppid=3175 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit: BPF prog-id=156 op=LOAD May 13 00:40:46.319000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc25fa8d8 a2=98 a3=ffffc25fa8c8 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.319000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.319000 audit: BPF prog-id=156 op=UNLOAD May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit: BPF prog-id=157 op=LOAD May 13 00:40:46.319000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc25fa568 a2=74 a3=95 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.319000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.319000 audit: BPF prog-id=157 op=UNLOAD May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.319000 audit: BPF prog-id=158 op=LOAD May 13 00:40:46.319000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc25fa5c8 a2=94 a3=2 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.319000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.319000 audit: BPF prog-id=158 op=UNLOAD May 13 00:40:46.313419 systemd[1]: run-containerd-runc-k8s.io-0209fcb50b6979008ac375fc7097ae4ea7354b24873671c78cdfd6046161940f-runc.ykUHxA.mount: Deactivated successfully. May 13 00:40:46.409000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.409000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.409000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.409000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.409000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.409000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.409000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.409000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.409000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.409000 audit: BPF prog-id=159 op=LOAD May 13 00:40:46.409000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc25fa588 a2=40 a3=ffffc25fa5b8 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.410000 audit: BPF prog-id=159 op=UNLOAD May 13 00:40:46.410000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.410000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc25fa6a0 a2=50 a3=0 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.410000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.418000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.418000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc25fa5f8 a2=28 a3=ffffc25fa728 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.418000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.418000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.418000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc25fa628 a2=28 a3=ffffc25fa758 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.418000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc25fa4d8 a2=28 a3=ffffc25fa608 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc25fa648 a2=28 a3=ffffc25fa778 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc25fa628 a2=28 a3=ffffc25fa758 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc25fa618 a2=28 a3=ffffc25fa748 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc25fa648 a2=28 a3=ffffc25fa778 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc25fa628 a2=28 a3=ffffc25fa758 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc25fa648 a2=28 a3=ffffc25fa778 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc25fa618 a2=28 a3=ffffc25fa748 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc25fa698 a2=28 a3=ffffc25fa7d8 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc25fa3d0 a2=50 a3=0 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit: BPF prog-id=160 op=LOAD May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc25fa3d8 a2=94 a3=5 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit: BPF prog-id=160 op=UNLOAD May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc25fa4e0 a2=50 a3=0 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc25fa628 a2=4 a3=3 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc25fa608 a2=94 a3=6 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc25f9dd8 a2=94 a3=83 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { perfmon } for pid=3324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.419000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:46.419000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc25f9dd8 a2=94 a3=83 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.420000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.420000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc25fb818 a2=10 a3=ffffc25fb908 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.420000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.420000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.420000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc25fb6d8 a2=10 a3=ffffc25fb7c8 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.420000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.420000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.420000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc25fb648 a2=10 a3=ffffc25fb7c8 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.420000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.420000 audit[3324]: AVC avc: denied { bpf } for pid=3324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.420000 audit[3324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc25fb648 a2=10 a3=ffffc25fb7c8 items=0 ppid=3175 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.420000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:46.429000 audit: BPF prog-id=155 op=UNLOAD May 13 00:40:46.470000 audit[3366]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3366 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:46.470000 audit[3366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc3d30ba0 a2=0 a3=ffff8b582fa8 items=0 ppid=3175 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.470000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:46.476000 audit[3367]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3367 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:46.476000 audit[3367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffcb9475d0 a2=0 a3=ffffa10a3fa8 items=0 ppid=3175 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.476000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:46.477000 audit[3368]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3368 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:46.477000 audit[3368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffff7aa9870 a2=0 a3=ffff8ef14fa8 items=0 ppid=3175 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.477000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:46.481000 audit[3365]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3365 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:46.481000 audit[3365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe64038a0 a2=0 a3=ffff8f7f9fa8 items=0 ppid=3175 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.481000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:47.770686 systemd[1]: Started sshd@8-10.0.0.136:22-10.0.0.1:58548.service. May 13 00:40:47.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.136:22-10.0.0.1:58548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:47.771836 kernel: kauditd_printk_skb: 559 callbacks suppressed May 13 00:40:47.771906 kernel: audit: type=1130 audit(1747096847.770:1131): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.136:22-10.0.0.1:58548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:47.813000 audit[3377]: USER_ACCT pid=3377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.813905 sshd[3377]: Accepted publickey for core from 10.0.0.1 port 58548 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:47.815000 audit[3377]: CRED_ACQ pid=3377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.817014 sshd[3377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:47.820270 kernel: audit: type=1101 audit(1747096847.813:1132): pid=3377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.821987 kernel: audit: type=1103 audit(1747096847.815:1133): pid=3377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.822041 kernel: audit: type=1006 audit(1747096847.815:1134): pid=3377 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 13 00:40:47.822061 kernel: audit: type=1300 audit(1747096847.815:1134): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe35b1f70 a2=3 a3=1 items=0 ppid=1 pid=3377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:47.815000 audit[3377]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe35b1f70 a2=3 a3=1 items=0 ppid=1 pid=3377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:47.821318 systemd[1]: Started session-9.scope. May 13 00:40:47.821645 systemd-logind[1204]: New session 9 of user core. May 13 00:40:47.815000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:40:47.826466 kernel: audit: type=1327 audit(1747096847.815:1134): proctitle=737368643A20636F7265205B707269765D May 13 00:40:47.826553 kernel: audit: type=1105 audit(1747096847.824:1135): pid=3377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.824000 audit[3377]: USER_START pid=3377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.826000 audit[3379]: CRED_ACQ pid=3379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.832682 kernel: audit: type=1103 audit(1747096847.826:1136): pid=3379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.966055 sshd[3377]: pam_unix(sshd:session): session closed for user core May 13 00:40:47.965000 audit[3377]: USER_END pid=3377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.968981 systemd[1]: sshd@8-10.0.0.136:22-10.0.0.1:58548.service: Deactivated successfully. May 13 00:40:47.969776 systemd[1]: session-9.scope: Deactivated successfully. May 13 00:40:47.970323 systemd-logind[1204]: Session 9 logged out. Waiting for processes to exit. May 13 00:40:47.971032 systemd-logind[1204]: Removed session 9. May 13 00:40:47.965000 audit[3377]: CRED_DISP pid=3377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.973990 kernel: audit: type=1106 audit(1747096847.965:1137): pid=3377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.974047 kernel: audit: type=1104 audit(1747096847.965:1138): pid=3377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:47.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.136:22-10.0.0.1:58548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:48.086659 systemd-networkd[1045]: vxlan.calico: Gained IPv6LL May 13 00:40:51.200617 env[1216]: time="2025-05-13T00:40:51.200562974Z" level=info msg="StopPodSandbox for \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\"" May 13 00:40:51.200967 env[1216]: time="2025-05-13T00:40:51.200564494Z" level=info msg="StopPodSandbox for \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\"" May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.279 [INFO][3422] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.280 [INFO][3422] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" iface="eth0" netns="/var/run/netns/cni-1edc8622-c972-5f5d-1deb-4c58baf86997" May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.280 [INFO][3422] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" iface="eth0" netns="/var/run/netns/cni-1edc8622-c972-5f5d-1deb-4c58baf86997" May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.283 [INFO][3422] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" iface="eth0" netns="/var/run/netns/cni-1edc8622-c972-5f5d-1deb-4c58baf86997" May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.283 [INFO][3422] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.283 [INFO][3422] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.390 [INFO][3442] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" HandleID="k8s-pod-network.b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.390 [INFO][3442] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.390 [INFO][3442] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.399 [WARNING][3442] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" HandleID="k8s-pod-network.b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.399 [INFO][3442] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" HandleID="k8s-pod-network.b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.401 [INFO][3442] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:51.404929 env[1216]: 2025-05-13 00:40:51.403 [INFO][3422] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:40:51.405615 env[1216]: time="2025-05-13T00:40:51.405576557Z" level=info msg="TearDown network for sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\" successfully" May 13 00:40:51.405705 env[1216]: time="2025-05-13T00:40:51.405687844Z" level=info msg="StopPodSandbox for \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\" returns successfully" May 13 00:40:51.407444 systemd[1]: run-netns-cni\x2d1edc8622\x2dc972\x2d5f5d\x2d1deb\x2d4c58baf86997.mount: Deactivated successfully. May 13 00:40:51.407959 env[1216]: time="2025-05-13T00:40:51.407931195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65cf854b4-kcm5m,Uid:e75667cf-26ee-4cdb-a7fe-64c643e5e0f4,Namespace:calico-apiserver,Attempt:1,}" May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.280 [INFO][3431] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.280 [INFO][3431] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" iface="eth0" netns="/var/run/netns/cni-21bf2a54-2a94-a2aa-8a98-1e952c282d4f" May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.280 [INFO][3431] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" iface="eth0" netns="/var/run/netns/cni-21bf2a54-2a94-a2aa-8a98-1e952c282d4f" May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.283 [INFO][3431] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" iface="eth0" netns="/var/run/netns/cni-21bf2a54-2a94-a2aa-8a98-1e952c282d4f" May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.283 [INFO][3431] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.283 [INFO][3431] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.390 [INFO][3443] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" HandleID="k8s-pod-network.726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.390 [INFO][3443] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.401 [INFO][3443] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.411 [WARNING][3443] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" HandleID="k8s-pod-network.726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.411 [INFO][3443] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" HandleID="k8s-pod-network.726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.412 [INFO][3443] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:51.415748 env[1216]: 2025-05-13 00:40:51.414 [INFO][3431] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:40:51.416420 env[1216]: time="2025-05-13T00:40:51.416384723Z" level=info msg="TearDown network for sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\" successfully" May 13 00:40:51.416539 env[1216]: time="2025-05-13T00:40:51.416510172Z" level=info msg="StopPodSandbox for \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\" returns successfully" May 13 00:40:51.417172 env[1216]: time="2025-05-13T00:40:51.417137614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-644fd5b575-vcg45,Uid:c3d6465d-07e8-4406-9026-a105e339cb72,Namespace:calico-system,Attempt:1,}" May 13 00:40:51.418109 systemd[1]: run-netns-cni\x2d21bf2a54\x2d2a94\x2da2aa\x2d8a98\x2d1e952c282d4f.mount: Deactivated successfully. May 13 00:40:51.557544 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:40:51.557750 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif7d144e9623: link becomes ready May 13 00:40:51.557126 systemd-networkd[1045]: calif7d144e9623: Link UP May 13 00:40:51.557637 systemd-networkd[1045]: calif7d144e9623: Gained carrier May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.476 [INFO][3460] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0 calico-apiserver-65cf854b4- calico-apiserver e75667cf-26ee-4cdb-a7fe-64c643e5e0f4 832 0 2025-05-13 00:40:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65cf854b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-65cf854b4-kcm5m eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif7d144e9623 [] []}} ContainerID="aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-kcm5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.477 [INFO][3460] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-kcm5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.509 [INFO][3496] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" HandleID="k8s-pod-network.aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.520 [INFO][3496] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" HandleID="k8s-pod-network.aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003055c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-65cf854b4-kcm5m", "timestamp":"2025-05-13 00:40:51.509138719 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.520 [INFO][3496] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.521 [INFO][3496] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.521 [INFO][3496] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.522 [INFO][3496] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" host="localhost" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.529 [INFO][3496] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.533 [INFO][3496] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.535 [INFO][3496] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.537 [INFO][3496] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.537 [INFO][3496] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" host="localhost" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.538 [INFO][3496] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073 May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.541 [INFO][3496] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" host="localhost" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.546 [INFO][3496] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" host="localhost" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.546 [INFO][3496] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" host="localhost" May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.546 [INFO][3496] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:51.572674 env[1216]: 2025-05-13 00:40:51.546 [INFO][3496] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" HandleID="k8s-pod-network.aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:40:51.573240 env[1216]: 2025-05-13 00:40:51.549 [INFO][3460] cni-plugin/k8s.go 386: Populated endpoint ContainerID="aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-kcm5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0", GenerateName:"calico-apiserver-65cf854b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"e75667cf-26ee-4cdb-a7fe-64c643e5e0f4", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65cf854b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-65cf854b4-kcm5m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif7d144e9623", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:51.573240 env[1216]: 2025-05-13 00:40:51.549 [INFO][3460] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-kcm5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:40:51.573240 env[1216]: 2025-05-13 00:40:51.549 [INFO][3460] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif7d144e9623 ContainerID="aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-kcm5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:40:51.573240 env[1216]: 2025-05-13 00:40:51.558 [INFO][3460] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-kcm5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:40:51.573240 env[1216]: 2025-05-13 00:40:51.558 [INFO][3460] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-kcm5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0", GenerateName:"calico-apiserver-65cf854b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"e75667cf-26ee-4cdb-a7fe-64c643e5e0f4", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65cf854b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073", Pod:"calico-apiserver-65cf854b4-kcm5m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif7d144e9623", MAC:"22:88:8a:53:17:a2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:51.573240 env[1216]: 2025-05-13 00:40:51.568 [INFO][3460] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-kcm5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:40:51.575000 audit[3523]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=3523 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:51.575000 audit[3523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23492 a0=3 a1=ffffe61c6420 a2=0 a3=ffff9021ffa8 items=0 ppid=3175 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.575000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:51.593649 env[1216]: time="2025-05-13T00:40:51.593563595Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:51.593649 env[1216]: time="2025-05-13T00:40:51.593608238Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:51.593649 env[1216]: time="2025-05-13T00:40:51.593619758Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:51.593850 env[1216]: time="2025-05-13T00:40:51.593792010Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073 pid=3537 runtime=io.containerd.runc.v2 May 13 00:40:51.604224 systemd[1]: Started cri-containerd-aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073.scope. May 13 00:40:51.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.636000 audit: BPF prog-id=161 op=LOAD May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3537 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161386561353031666262653936313139613538643761656261366562 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3537 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161386561353031666262653936313139613538643761656261366562 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit: BPF prog-id=162 op=LOAD May 13 00:40:51.637000 audit[3548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3537 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161386561353031666262653936313139613538643761656261366562 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit: BPF prog-id=163 op=LOAD May 13 00:40:51.637000 audit[3548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3537 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161386561353031666262653936313139613538643761656261366562 May 13 00:40:51.637000 audit: BPF prog-id=163 op=UNLOAD May 13 00:40:51.637000 audit: BPF prog-id=162 op=UNLOAD May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.637000 audit: BPF prog-id=164 op=LOAD May 13 00:40:51.637000 audit[3548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3537 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161386561353031666262653936313139613538643761656261366562 May 13 00:40:51.640314 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:40:51.650412 systemd-networkd[1045]: cali2c6818f20b0: Link UP May 13 00:40:51.651199 systemd-networkd[1045]: cali2c6818f20b0: Gained carrier May 13 00:40:51.651527 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2c6818f20b0: link becomes ready May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.475 [INFO][3458] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0 calico-kube-controllers-644fd5b575- calico-system c3d6465d-07e8-4406-9026-a105e339cb72 831 0 2025-05-13 00:40:30 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:644fd5b575 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-644fd5b575-vcg45 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali2c6818f20b0 [] []}} ContainerID="898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" Namespace="calico-system" Pod="calico-kube-controllers-644fd5b575-vcg45" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.475 [INFO][3458] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" Namespace="calico-system" Pod="calico-kube-controllers-644fd5b575-vcg45" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.512 [INFO][3498] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" HandleID="k8s-pod-network.898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.524 [INFO][3498] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" HandleID="k8s-pod-network.898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f2df0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-644fd5b575-vcg45", "timestamp":"2025-05-13 00:40:51.512069316 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.524 [INFO][3498] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.546 [INFO][3498] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.546 [INFO][3498] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.624 [INFO][3498] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" host="localhost" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.629 [INFO][3498] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.634 [INFO][3498] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.635 [INFO][3498] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.637 [INFO][3498] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.637 [INFO][3498] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" host="localhost" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.638 [INFO][3498] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.642 [INFO][3498] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" host="localhost" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.646 [INFO][3498] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" host="localhost" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.646 [INFO][3498] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" host="localhost" May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.646 [INFO][3498] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:51.666278 env[1216]: 2025-05-13 00:40:51.646 [INFO][3498] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" HandleID="k8s-pod-network.898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:40:51.666948 env[1216]: 2025-05-13 00:40:51.648 [INFO][3458] cni-plugin/k8s.go 386: Populated endpoint ContainerID="898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" Namespace="calico-system" Pod="calico-kube-controllers-644fd5b575-vcg45" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0", GenerateName:"calico-kube-controllers-644fd5b575-", Namespace:"calico-system", SelfLink:"", UID:"c3d6465d-07e8-4406-9026-a105e339cb72", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"644fd5b575", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-644fd5b575-vcg45", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2c6818f20b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:51.666948 env[1216]: 2025-05-13 00:40:51.648 [INFO][3458] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" Namespace="calico-system" Pod="calico-kube-controllers-644fd5b575-vcg45" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:40:51.666948 env[1216]: 2025-05-13 00:40:51.648 [INFO][3458] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2c6818f20b0 ContainerID="898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" Namespace="calico-system" Pod="calico-kube-controllers-644fd5b575-vcg45" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:40:51.666948 env[1216]: 2025-05-13 00:40:51.651 [INFO][3458] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" Namespace="calico-system" Pod="calico-kube-controllers-644fd5b575-vcg45" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:40:51.666948 env[1216]: 2025-05-13 00:40:51.654 [INFO][3458] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" Namespace="calico-system" Pod="calico-kube-controllers-644fd5b575-vcg45" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0", GenerateName:"calico-kube-controllers-644fd5b575-", Namespace:"calico-system", SelfLink:"", UID:"c3d6465d-07e8-4406-9026-a105e339cb72", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"644fd5b575", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b", Pod:"calico-kube-controllers-644fd5b575-vcg45", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2c6818f20b0", MAC:"82:0e:94:14:23:06", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:51.666948 env[1216]: 2025-05-13 00:40:51.662 [INFO][3458] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b" Namespace="calico-system" Pod="calico-kube-controllers-644fd5b575-vcg45" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:40:51.668816 env[1216]: time="2025-05-13T00:40:51.668762050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65cf854b4-kcm5m,Uid:e75667cf-26ee-4cdb-a7fe-64c643e5e0f4,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073\"" May 13 00:40:51.670303 env[1216]: time="2025-05-13T00:40:51.670207427Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:40:51.673000 audit[3584]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3584 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:51.673000 audit[3584]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffe4a59830 a2=0 a3=ffff86ccefa8 items=0 ppid=3175 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.673000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:51.681400 env[1216]: time="2025-05-13T00:40:51.681330455Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:51.681473 env[1216]: time="2025-05-13T00:40:51.681404380Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:51.681473 env[1216]: time="2025-05-13T00:40:51.681440142Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:51.681641 env[1216]: time="2025-05-13T00:40:51.681606074Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b pid=3593 runtime=io.containerd.runc.v2 May 13 00:40:51.691812 systemd[1]: Started cri-containerd-898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b.scope. May 13 00:40:51.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit: BPF prog-id=165 op=LOAD May 13 00:40:51.716000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit[3603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3593 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386639666434383466376463346439353362633136346163396366 May 13 00:40:51.716000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.716000 audit[3603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3593 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386639666434383466376463346439353362633136346163396366 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit: BPF prog-id=166 op=LOAD May 13 00:40:51.717000 audit[3603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3593 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386639666434383466376463346439353362633136346163396366 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.717000 audit: BPF prog-id=167 op=LOAD May 13 00:40:51.717000 audit[3603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3593 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386639666434383466376463346439353362633136346163396366 May 13 00:40:51.718000 audit: BPF prog-id=167 op=UNLOAD May 13 00:40:51.718000 audit: BPF prog-id=166 op=UNLOAD May 13 00:40:51.718000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.718000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.718000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.718000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.718000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.718000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.718000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.718000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.718000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.718000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:51.718000 audit: BPF prog-id=168 op=LOAD May 13 00:40:51.718000 audit[3603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3593 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:51.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386639666434383466376463346439353362633136346163396366 May 13 00:40:51.721054 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:40:51.738164 env[1216]: time="2025-05-13T00:40:51.738104232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-644fd5b575-vcg45,Uid:c3d6465d-07e8-4406-9026-a105e339cb72,Namespace:calico-system,Attempt:1,} returns sandbox id \"898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b\"" May 13 00:40:52.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.136:22-10.0.0.1:49040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:52.971395 systemd[1]: Started sshd@9-10.0.0.136:22-10.0.0.1:49040.service. May 13 00:40:52.975404 kernel: kauditd_printk_skb: 121 callbacks suppressed May 13 00:40:52.975502 kernel: audit: type=1130 audit(1747096852.970:1178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.136:22-10.0.0.1:49040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:53.014630 systemd-networkd[1045]: cali2c6818f20b0: Gained IPv6LL May 13 00:40:53.029000 audit[3626]: USER_ACCT pid=3626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.031237 sshd[3626]: Accepted publickey for core from 10.0.0.1 port 49040 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:53.029000 audit[3626]: CRED_ACQ pid=3626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.034389 sshd[3626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:53.037067 kernel: audit: type=1101 audit(1747096853.029:1179): pid=3626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.037143 kernel: audit: type=1103 audit(1747096853.029:1180): pid=3626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.037166 kernel: audit: type=1006 audit(1747096853.029:1181): pid=3626 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 13 00:40:53.029000 audit[3626]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe999a6a0 a2=3 a3=1 items=0 ppid=1 pid=3626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.039033 systemd[1]: Started session-10.scope. May 13 00:40:53.039362 systemd-logind[1204]: New session 10 of user core. May 13 00:40:53.045092 kernel: audit: type=1300 audit(1747096853.029:1181): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe999a6a0 a2=3 a3=1 items=0 ppid=1 pid=3626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.045173 kernel: audit: type=1327 audit(1747096853.029:1181): proctitle=737368643A20636F7265205B707269765D May 13 00:40:53.029000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:40:53.044000 audit[3626]: USER_START pid=3626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.045000 audit[3628]: CRED_ACQ pid=3628 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.055930 kernel: audit: type=1105 audit(1747096853.044:1182): pid=3626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.055991 kernel: audit: type=1103 audit(1747096853.045:1183): pid=3628 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.200771 env[1216]: time="2025-05-13T00:40:53.200720714Z" level=info msg="StopPodSandbox for \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\"" May 13 00:40:53.202550 env[1216]: time="2025-05-13T00:40:53.201584209Z" level=info msg="StopPodSandbox for \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\"" May 13 00:40:53.211464 sshd[3626]: pam_unix(sshd:session): session closed for user core May 13 00:40:53.212000 audit[3626]: USER_END pid=3626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.215220 systemd[1]: sshd@9-10.0.0.136:22-10.0.0.1:49040.service: Deactivated successfully. May 13 00:40:53.215867 systemd[1]: session-10.scope: Deactivated successfully. May 13 00:40:53.216426 systemd-logind[1204]: Session 10 logged out. Waiting for processes to exit. May 13 00:40:53.212000 audit[3626]: CRED_DISP pid=3626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.217522 systemd[1]: Started sshd@10-10.0.0.136:22-10.0.0.1:49044.service. May 13 00:40:53.218218 systemd-logind[1204]: Removed session 10. May 13 00:40:53.220187 kernel: audit: type=1106 audit(1747096853.212:1184): pid=3626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.220258 kernel: audit: type=1104 audit(1747096853.212:1185): pid=3626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.136:22-10.0.0.1:49040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:53.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.136:22-10.0.0.1:49044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:53.254000 audit[3669]: USER_ACCT pid=3669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.256392 sshd[3669]: Accepted publickey for core from 10.0.0.1 port 49044 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:53.255000 audit[3669]: CRED_ACQ pid=3669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.256000 audit[3669]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcfd56160 a2=3 a3=1 items=0 ppid=1 pid=3669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.256000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:40:53.258832 sshd[3669]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:53.266271 systemd-logind[1204]: New session 11 of user core. May 13 00:40:53.266740 systemd[1]: Started session-11.scope. May 13 00:40:53.270648 systemd-networkd[1045]: calif7d144e9623: Gained IPv6LL May 13 00:40:53.273000 audit[3669]: USER_START pid=3669 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.277000 audit[3691]: CRED_ACQ pid=3691 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.284 [INFO][3670] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.284 [INFO][3670] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" iface="eth0" netns="/var/run/netns/cni-d4141191-2d48-6760-dd1f-84f242217e5d" May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.287 [INFO][3670] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" iface="eth0" netns="/var/run/netns/cni-d4141191-2d48-6760-dd1f-84f242217e5d" May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.287 [INFO][3670] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" iface="eth0" netns="/var/run/netns/cni-d4141191-2d48-6760-dd1f-84f242217e5d" May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.288 [INFO][3670] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.288 [INFO][3670] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.310 [INFO][3694] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" HandleID="k8s-pod-network.e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.310 [INFO][3694] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.310 [INFO][3694] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.320 [WARNING][3694] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" HandleID="k8s-pod-network.e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.320 [INFO][3694] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" HandleID="k8s-pod-network.e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.323 [INFO][3694] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:53.334574 env[1216]: 2025-05-13 00:40:53.332 [INFO][3670] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:40:53.335721 env[1216]: time="2025-05-13T00:40:53.335680487Z" level=info msg="TearDown network for sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\" successfully" May 13 00:40:53.335827 env[1216]: time="2025-05-13T00:40:53.335806895Z" level=info msg="StopPodSandbox for \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\" returns successfully" May 13 00:40:53.336223 kubelet[1956]: E0513 00:40:53.336180 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:53.337394 systemd[1]: run-netns-cni\x2dd4141191\x2d2d48\x2d6760\x2ddd1f\x2d84f242217e5d.mount: Deactivated successfully. May 13 00:40:53.339367 env[1216]: time="2025-05-13T00:40:53.339320158Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d98p4,Uid:7acf1133-f126-4ff5-9211-a424f15ef5ea,Namespace:kube-system,Attempt:1,}" May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.300 [INFO][3682] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.300 [INFO][3682] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" iface="eth0" netns="/var/run/netns/cni-5dc3f454-e868-6459-d1ec-278da975444a" May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.300 [INFO][3682] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" iface="eth0" netns="/var/run/netns/cni-5dc3f454-e868-6459-d1ec-278da975444a" May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.300 [INFO][3682] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" iface="eth0" netns="/var/run/netns/cni-5dc3f454-e868-6459-d1ec-278da975444a" May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.301 [INFO][3682] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.301 [INFO][3682] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.334 [INFO][3701] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" HandleID="k8s-pod-network.a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.335 [INFO][3701] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.335 [INFO][3701] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.348 [WARNING][3701] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" HandleID="k8s-pod-network.a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.348 [INFO][3701] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" HandleID="k8s-pod-network.a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.349 [INFO][3701] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:53.353227 env[1216]: 2025-05-13 00:40:53.351 [INFO][3682] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:40:53.355214 systemd[1]: run-netns-cni\x2d5dc3f454\x2de868\x2d6459\x2dd1ec\x2d278da975444a.mount: Deactivated successfully. May 13 00:40:53.355964 env[1216]: time="2025-05-13T00:40:53.355916532Z" level=info msg="TearDown network for sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\" successfully" May 13 00:40:53.355964 env[1216]: time="2025-05-13T00:40:53.355958535Z" level=info msg="StopPodSandbox for \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\" returns successfully" May 13 00:40:53.356675 env[1216]: time="2025-05-13T00:40:53.356630138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wnv28,Uid:7fb607c6-e13a-4bd1-be40-1ff0cacb38e0,Namespace:calico-system,Attempt:1,}" May 13 00:40:53.520765 sshd[3669]: pam_unix(sshd:session): session closed for user core May 13 00:40:53.525000 audit[3669]: USER_END pid=3669 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.525000 audit[3669]: CRED_DISP pid=3669 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.136:22-10.0.0.1:49048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:53.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.136:22-10.0.0.1:49044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:53.527070 systemd[1]: Started sshd@11-10.0.0.136:22-10.0.0.1:49048.service. May 13 00:40:53.531442 systemd[1]: sshd@10-10.0.0.136:22-10.0.0.1:49044.service: Deactivated successfully. May 13 00:40:53.532612 systemd[1]: session-11.scope: Deactivated successfully. May 13 00:40:53.535555 systemd-logind[1204]: Session 11 logged out. Waiting for processes to exit. May 13 00:40:53.543835 systemd-logind[1204]: Removed session 11. May 13 00:40:53.560080 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:40:53.560178 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaae2c3d6924: link becomes ready May 13 00:40:53.558788 systemd-networkd[1045]: caliaae2c3d6924: Link UP May 13 00:40:53.559994 systemd-networkd[1045]: caliaae2c3d6924: Gained carrier May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.434 [INFO][3717] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--wnv28-eth0 csi-node-driver- calico-system 7fb607c6-e13a-4bd1-be40-1ff0cacb38e0 850 0 2025-05-13 00:40:30 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-wnv28 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] caliaae2c3d6924 [] []}} ContainerID="a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" Namespace="calico-system" Pod="csi-node-driver-wnv28" WorkloadEndpoint="localhost-k8s-csi--node--driver--wnv28-" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.434 [INFO][3717] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" Namespace="calico-system" Pod="csi-node-driver-wnv28" WorkloadEndpoint="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.474 [INFO][3745] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" HandleID="k8s-pod-network.a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.492 [INFO][3745] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" HandleID="k8s-pod-network.a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004cdb0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-wnv28", "timestamp":"2025-05-13 00:40:53.474022795 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.492 [INFO][3745] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.492 [INFO][3745] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.492 [INFO][3745] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.494 [INFO][3745] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" host="localhost" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.499 [INFO][3745] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.503 [INFO][3745] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.506 [INFO][3745] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.508 [INFO][3745] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.509 [INFO][3745] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" host="localhost" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.510 [INFO][3745] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841 May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.516 [INFO][3745] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" host="localhost" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.547 [INFO][3745] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" host="localhost" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.550 [INFO][3745] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" host="localhost" May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.550 [INFO][3745] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:53.578608 env[1216]: 2025-05-13 00:40:53.550 [INFO][3745] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" HandleID="k8s-pod-network.a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:40:53.579203 env[1216]: 2025-05-13 00:40:53.553 [INFO][3717] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" Namespace="calico-system" Pod="csi-node-driver-wnv28" WorkloadEndpoint="localhost-k8s-csi--node--driver--wnv28-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wnv28-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7fb607c6-e13a-4bd1-be40-1ff0cacb38e0", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-wnv28", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaae2c3d6924", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:53.579203 env[1216]: 2025-05-13 00:40:53.553 [INFO][3717] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" Namespace="calico-system" Pod="csi-node-driver-wnv28" WorkloadEndpoint="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:40:53.579203 env[1216]: 2025-05-13 00:40:53.553 [INFO][3717] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliaae2c3d6924 ContainerID="a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" Namespace="calico-system" Pod="csi-node-driver-wnv28" WorkloadEndpoint="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:40:53.579203 env[1216]: 2025-05-13 00:40:53.560 [INFO][3717] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" Namespace="calico-system" Pod="csi-node-driver-wnv28" WorkloadEndpoint="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:40:53.579203 env[1216]: 2025-05-13 00:40:53.565 [INFO][3717] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" Namespace="calico-system" Pod="csi-node-driver-wnv28" WorkloadEndpoint="localhost-k8s-csi--node--driver--wnv28-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wnv28-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7fb607c6-e13a-4bd1-be40-1ff0cacb38e0", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841", Pod:"csi-node-driver-wnv28", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaae2c3d6924", MAC:"52:49:cd:32:9c:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:53.579203 env[1216]: 2025-05-13 00:40:53.576 [INFO][3717] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841" Namespace="calico-system" Pod="csi-node-driver-wnv28" WorkloadEndpoint="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:40:53.581000 audit[3771]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3771 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:53.581000 audit[3771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19828 a0=3 a1=ffffc731e060 a2=0 a3=ffff93e0efa8 items=0 ppid=3175 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.581000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:53.585000 audit[3763]: USER_ACCT pid=3763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.587729 sshd[3763]: Accepted publickey for core from 10.0.0.1 port 49048 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:53.587000 audit[3763]: CRED_ACQ pid=3763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.587000 audit[3763]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd8137330 a2=3 a3=1 items=0 ppid=1 pid=3763 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.587000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:40:53.589559 sshd[3763]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:53.593709 systemd-logind[1204]: New session 12 of user core. May 13 00:40:53.594091 systemd[1]: Started session-12.scope. May 13 00:40:53.598000 audit[3763]: USER_START pid=3763 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.600000 audit[3784]: CRED_ACQ pid=3784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.608756 env[1216]: time="2025-05-13T00:40:53.608109672Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:53.608756 env[1216]: time="2025-05-13T00:40:53.608695109Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:53.608756 env[1216]: time="2025-05-13T00:40:53.608706190Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:53.609532 env[1216]: time="2025-05-13T00:40:53.609234544Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841 pid=3791 runtime=io.containerd.runc.v2 May 13 00:40:53.627142 systemd-networkd[1045]: calid0ecbd98031: Link UP May 13 00:40:53.631483 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid0ecbd98031: link becomes ready May 13 00:40:53.631686 systemd-networkd[1045]: calid0ecbd98031: Gained carrier May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.448 [INFO][3728] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--d98p4-eth0 coredns-668d6bf9bc- kube-system 7acf1133-f126-4ff5-9211-a424f15ef5ea 849 0 2025-05-13 00:40:23 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-d98p4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid0ecbd98031 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" Namespace="kube-system" Pod="coredns-668d6bf9bc-d98p4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d98p4-" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.448 [INFO][3728] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" Namespace="kube-system" Pod="coredns-668d6bf9bc-d98p4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.520 [INFO][3751] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" HandleID="k8s-pod-network.60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.586 [INFO][3751] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" HandleID="k8s-pod-network.60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000362e60), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-d98p4", "timestamp":"2025-05-13 00:40:53.52086393 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.586 [INFO][3751] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.586 [INFO][3751] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.586 [INFO][3751] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.596 [INFO][3751] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" host="localhost" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.603 [INFO][3751] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.607 [INFO][3751] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.609 [INFO][3751] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.611 [INFO][3751] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.611 [INFO][3751] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" host="localhost" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.612 [INFO][3751] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.617 [INFO][3751] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" host="localhost" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.623 [INFO][3751] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" host="localhost" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.623 [INFO][3751] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" host="localhost" May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.623 [INFO][3751] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:53.644811 env[1216]: 2025-05-13 00:40:53.623 [INFO][3751] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" HandleID="k8s-pod-network.60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:40:53.645379 env[1216]: 2025-05-13 00:40:53.625 [INFO][3728] cni-plugin/k8s.go 386: Populated endpoint ContainerID="60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" Namespace="kube-system" Pod="coredns-668d6bf9bc-d98p4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d98p4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"7acf1133-f126-4ff5-9211-a424f15ef5ea", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-d98p4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid0ecbd98031", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:53.645379 env[1216]: 2025-05-13 00:40:53.625 [INFO][3728] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" Namespace="kube-system" Pod="coredns-668d6bf9bc-d98p4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:40:53.645379 env[1216]: 2025-05-13 00:40:53.625 [INFO][3728] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid0ecbd98031 ContainerID="60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" Namespace="kube-system" Pod="coredns-668d6bf9bc-d98p4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:40:53.645379 env[1216]: 2025-05-13 00:40:53.630 [INFO][3728] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" Namespace="kube-system" Pod="coredns-668d6bf9bc-d98p4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:40:53.645379 env[1216]: 2025-05-13 00:40:53.631 [INFO][3728] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" Namespace="kube-system" Pod="coredns-668d6bf9bc-d98p4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d98p4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"7acf1133-f126-4ff5-9211-a424f15ef5ea", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c", Pod:"coredns-668d6bf9bc-d98p4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid0ecbd98031", MAC:"1a:ca:05:60:7e:6a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:53.645379 env[1216]: 2025-05-13 00:40:53.640 [INFO][3728] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c" Namespace="kube-system" Pod="coredns-668d6bf9bc-d98p4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:40:53.648623 systemd[1]: run-containerd-runc-k8s.io-a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841-runc.N9XAPZ.mount: Deactivated successfully. May 13 00:40:53.651162 systemd[1]: Started cri-containerd-a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841.scope. May 13 00:40:53.650000 audit[3823]: NETFILTER_CFG table=filter:104 family=2 entries=46 op=nft_register_chain pid=3823 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:53.650000 audit[3823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22712 a0=3 a1=ffffc8e721a0 a2=0 a3=ffff99d05fa8 items=0 ppid=3175 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.650000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:53.680519 env[1216]: time="2025-05-13T00:40:53.680444267Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:53.680728 env[1216]: time="2025-05-13T00:40:53.680480989Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:53.680728 env[1216]: time="2025-05-13T00:40:53.680500190Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:53.680728 env[1216]: time="2025-05-13T00:40:53.680610357Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c pid=3844 runtime=io.containerd.runc.v2 May 13 00:40:53.692164 systemd[1]: Started cri-containerd-60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c.scope. May 13 00:40:53.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit: BPF prog-id=169 op=LOAD May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3791 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313064333930633965323739303430643937656135333764306139 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3791 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313064333930633965323739303430643937656135333764306139 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit: BPF prog-id=170 op=LOAD May 13 00:40:53.731000 audit[3804]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3791 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313064333930633965323739303430643937656135333764306139 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit: BPF prog-id=171 op=LOAD May 13 00:40:53.731000 audit[3804]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3791 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313064333930633965323739303430643937656135333764306139 May 13 00:40:53.731000 audit: BPF prog-id=171 op=UNLOAD May 13 00:40:53.731000 audit: BPF prog-id=170 op=UNLOAD May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.731000 audit: BPF prog-id=172 op=LOAD May 13 00:40:53.731000 audit[3804]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3791 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313064333930633965323739303430643937656135333764306139 May 13 00:40:53.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.732000 audit: BPF prog-id=173 op=LOAD May 13 00:40:53.735000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.735000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3844 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663031636535396539383636353533653566633938373337353865 May 13 00:40:53.735000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.735000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3844 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663031636535396539383636353533653566633938373337353865 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit: BPF prog-id=174 op=LOAD May 13 00:40:53.736000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3844 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663031636535396539383636353533653566633938373337353865 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.738733 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:40:53.736000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.736000 audit: BPF prog-id=175 op=LOAD May 13 00:40:53.736000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3844 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663031636535396539383636353533653566633938373337353865 May 13 00:40:53.737000 audit: BPF prog-id=175 op=UNLOAD May 13 00:40:53.737000 audit: BPF prog-id=174 op=UNLOAD May 13 00:40:53.737000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.737000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.737000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.737000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.737000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.737000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.737000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.737000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.737000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.737000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.737000 audit: BPF prog-id=176 op=LOAD May 13 00:40:53.737000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3844 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663031636535396539383636353533653566633938373337353865 May 13 00:40:53.740799 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:40:53.800265 env[1216]: time="2025-05-13T00:40:53.800167192Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wnv28,Uid:7fb607c6-e13a-4bd1-be40-1ff0cacb38e0,Namespace:calico-system,Attempt:1,} returns sandbox id \"a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841\"" May 13 00:40:53.800575 env[1216]: time="2025-05-13T00:40:53.800263878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d98p4,Uid:7acf1133-f126-4ff5-9211-a424f15ef5ea,Namespace:kube-system,Attempt:1,} returns sandbox id \"60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c\"" May 13 00:40:53.802568 kubelet[1956]: E0513 00:40:53.802418 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:53.804170 env[1216]: time="2025-05-13T00:40:53.804142124Z" level=info msg="CreateContainer within sandbox \"60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:40:53.822755 sshd[3763]: pam_unix(sshd:session): session closed for user core May 13 00:40:53.822000 audit[3763]: USER_END pid=3763 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.822000 audit[3763]: CRED_DISP pid=3763 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:53.825189 systemd[1]: sshd@11-10.0.0.136:22-10.0.0.1:49048.service: Deactivated successfully. May 13 00:40:53.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.136:22-10.0.0.1:49048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:53.825943 systemd[1]: session-12.scope: Deactivated successfully. May 13 00:40:53.826453 systemd-logind[1204]: Session 12 logged out. Waiting for processes to exit. May 13 00:40:53.827340 systemd-logind[1204]: Removed session 12. May 13 00:40:53.848711 env[1216]: time="2025-05-13T00:40:53.848658472Z" level=info msg="CreateContainer within sandbox \"60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"925d015f595c2afbc127c61898c424c05ccca31cffb72a9ff592c5008ac0fe4f\"" May 13 00:40:53.849529 env[1216]: time="2025-05-13T00:40:53.849482324Z" level=info msg="StartContainer for \"925d015f595c2afbc127c61898c424c05ccca31cffb72a9ff592c5008ac0fe4f\"" May 13 00:40:53.854753 env[1216]: time="2025-05-13T00:40:53.854721257Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:53.856773 env[1216]: time="2025-05-13T00:40:53.856728225Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:53.858286 env[1216]: time="2025-05-13T00:40:53.858248961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:53.859536 env[1216]: time="2025-05-13T00:40:53.859481920Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:53.860029 env[1216]: time="2025-05-13T00:40:53.859986832Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 13 00:40:53.861976 env[1216]: time="2025-05-13T00:40:53.861941996Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 13 00:40:53.862612 env[1216]: time="2025-05-13T00:40:53.862558035Z" level=info msg="CreateContainer within sandbox \"aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:40:53.867568 systemd[1]: Started cri-containerd-925d015f595c2afbc127c61898c424c05ccca31cffb72a9ff592c5008ac0fe4f.scope. May 13 00:40:53.879525 env[1216]: time="2025-05-13T00:40:53.875740672Z" level=info msg="CreateContainer within sandbox \"aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"78c7ac72ebcf0ae502d86a398740780437b3d9a4307536a64a99d5720e646b00\"" May 13 00:40:53.879525 env[1216]: time="2025-05-13T00:40:53.876260425Z" level=info msg="StartContainer for \"78c7ac72ebcf0ae502d86a398740780437b3d9a4307536a64a99d5720e646b00\"" May 13 00:40:53.891846 systemd[1]: Started cri-containerd-78c7ac72ebcf0ae502d86a398740780437b3d9a4307536a64a99d5720e646b00.scope. May 13 00:40:53.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.894000 audit: BPF prog-id=177 op=LOAD May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3844 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932356430313566353935633261666263313237633631383938633432 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3844 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932356430313566353935633261666263313237633631383938633432 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit: BPF prog-id=178 op=LOAD May 13 00:40:53.895000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3844 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932356430313566353935633261666263313237633631383938633432 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit: BPF prog-id=179 op=LOAD May 13 00:40:53.895000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=19 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3844 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932356430313566353935633261666263313237633631383938633432 May 13 00:40:53.895000 audit: BPF prog-id=179 op=UNLOAD May 13 00:40:53.895000 audit: BPF prog-id=178 op=UNLOAD May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.895000 audit: BPF prog-id=180 op=LOAD May 13 00:40:53.895000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3844 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932356430313566353935633261666263313237633631383938633432 May 13 00:40:53.915395 env[1216]: time="2025-05-13T00:40:53.915352949Z" level=info msg="StartContainer for \"925d015f595c2afbc127c61898c424c05ccca31cffb72a9ff592c5008ac0fe4f\" returns successfully" May 13 00:40:53.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit: BPF prog-id=181 op=LOAD May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3537 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738633761633732656263663061653530326438366133393837343037 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3537 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738633761633732656263663061653530326438366133393837343037 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit: BPF prog-id=182 op=LOAD May 13 00:40:53.925000 audit[3926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3537 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738633761633732656263663061653530326438366133393837343037 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit: BPF prog-id=183 op=LOAD May 13 00:40:53.925000 audit[3926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3537 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738633761633732656263663061653530326438366133393837343037 May 13 00:40:53.925000 audit: BPF prog-id=183 op=UNLOAD May 13 00:40:53.925000 audit: BPF prog-id=182 op=UNLOAD May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:53.925000 audit: BPF prog-id=184 op=LOAD May 13 00:40:53.925000 audit[3926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3537 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:53.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738633761633732656263663061653530326438366133393837343037 May 13 00:40:53.946113 env[1216]: time="2025-05-13T00:40:53.946069100Z" level=info msg="StartContainer for \"78c7ac72ebcf0ae502d86a398740780437b3d9a4307536a64a99d5720e646b00\" returns successfully" May 13 00:40:53.989000 audit[3910]: AVC avc: denied { getattr } for pid=3910 comm="coredns" path="cgroup:[4026532495]" dev="nsfs" ino=4026532495 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c582 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 13 00:40:53.989000 audit[3910]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=40005b8960 a2=4000156578 a3=0 items=0 ppid=3844 pid=3910 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c582 key=(null) May 13 00:40:53.989000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 13 00:40:54.200958 env[1216]: time="2025-05-13T00:40:54.200920353Z" level=info msg="StopPodSandbox for \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\"" May 13 00:40:54.201411 env[1216]: time="2025-05-13T00:40:54.201164048Z" level=info msg="StopPodSandbox for \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\"" May 13 00:40:54.314639 kubelet[1956]: E0513 00:40:54.314607 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.270 [INFO][4004] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.270 [INFO][4004] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" iface="eth0" netns="/var/run/netns/cni-1f3ab3b0-bc6a-dc33-b824-56b1130cbe13" May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.270 [INFO][4004] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" iface="eth0" netns="/var/run/netns/cni-1f3ab3b0-bc6a-dc33-b824-56b1130cbe13" May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.271 [INFO][4004] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" iface="eth0" netns="/var/run/netns/cni-1f3ab3b0-bc6a-dc33-b824-56b1130cbe13" May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.271 [INFO][4004] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.271 [INFO][4004] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.304 [INFO][4021] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" HandleID="k8s-pod-network.b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.304 [INFO][4021] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.304 [INFO][4021] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.318 [WARNING][4021] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" HandleID="k8s-pod-network.b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.318 [INFO][4021] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" HandleID="k8s-pod-network.b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.319 [INFO][4021] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:54.335063 env[1216]: 2025-05-13 00:40:54.331 [INFO][4004] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:40:54.341595 kubelet[1956]: I0513 00:40:54.339188 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-d98p4" podStartSLOduration=31.339161662 podStartE2EDuration="31.339161662s" podCreationTimestamp="2025-05-13 00:40:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:40:54.326022009 +0000 UTC m=+39.224225358" watchObservedRunningTime="2025-05-13 00:40:54.339161662 +0000 UTC m=+39.237365011" May 13 00:40:54.342089 kubelet[1956]: I0513 00:40:54.342048 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65cf854b4-kcm5m" podStartSLOduration=22.150800102 podStartE2EDuration="24.34203616s" podCreationTimestamp="2025-05-13 00:40:30 +0000 UTC" firstStartedPulling="2025-05-13 00:40:51.669972091 +0000 UTC m=+36.568175440" lastFinishedPulling="2025-05-13 00:40:53.861208189 +0000 UTC m=+38.759411498" observedRunningTime="2025-05-13 00:40:54.339096858 +0000 UTC m=+39.237300207" watchObservedRunningTime="2025-05-13 00:40:54.34203616 +0000 UTC m=+39.240239509" May 13 00:40:54.343702 env[1216]: time="2025-05-13T00:40:54.343654860Z" level=info msg="TearDown network for sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\" successfully" May 13 00:40:54.343862 env[1216]: time="2025-05-13T00:40:54.343838551Z" level=info msg="StopPodSandbox for \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\" returns successfully" May 13 00:40:54.346786 env[1216]: time="2025-05-13T00:40:54.346673566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65cf854b4-rlcz6,Uid:c71d13a4-e163-400c-ad03-9388338c0caa,Namespace:calico-apiserver,Attempt:1,}" May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.301 [INFO][4009] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.302 [INFO][4009] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" iface="eth0" netns="/var/run/netns/cni-5cb40dc9-deb8-9180-8f6e-c72fccf51477" May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.302 [INFO][4009] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" iface="eth0" netns="/var/run/netns/cni-5cb40dc9-deb8-9180-8f6e-c72fccf51477" May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.311 [INFO][4009] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" iface="eth0" netns="/var/run/netns/cni-5cb40dc9-deb8-9180-8f6e-c72fccf51477" May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.312 [INFO][4009] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.312 [INFO][4009] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.356 [INFO][4029] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" HandleID="k8s-pod-network.1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.356 [INFO][4029] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.356 [INFO][4029] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.365 [WARNING][4029] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" HandleID="k8s-pod-network.1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.365 [INFO][4029] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" HandleID="k8s-pod-network.1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.366 [INFO][4029] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:54.370891 env[1216]: 2025-05-13 00:40:54.368 [INFO][4009] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:40:54.371349 env[1216]: time="2025-05-13T00:40:54.371018952Z" level=info msg="TearDown network for sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\" successfully" May 13 00:40:54.371349 env[1216]: time="2025-05-13T00:40:54.371050434Z" level=info msg="StopPodSandbox for \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\" returns successfully" May 13 00:40:54.371614 kubelet[1956]: E0513 00:40:54.371586 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:54.372382 env[1216]: time="2025-05-13T00:40:54.372349874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-dkt4t,Uid:29fc948b-1295-4736-8ba8-8d4160e63002,Namespace:kube-system,Attempt:1,}" May 13 00:40:54.386000 audit[4038]: NETFILTER_CFG table=filter:105 family=2 entries=16 op=nft_register_rule pid=4038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:54.386000 audit[4038]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe4fbc2f0 a2=0 a3=1 items=0 ppid=2103 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:54.391000 audit[4038]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=4038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:54.391000 audit[4038]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffe4fbc2f0 a2=0 a3=1 items=0 ppid=2103 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:54.410745 systemd[1]: run-netns-cni\x2d5cb40dc9\x2ddeb8\x2d9180\x2d8f6e\x2dc72fccf51477.mount: Deactivated successfully. May 13 00:40:54.410828 systemd[1]: run-netns-cni\x2d1f3ab3b0\x2dbc6a\x2ddc33\x2db824\x2d56b1130cbe13.mount: Deactivated successfully. May 13 00:40:54.422000 audit[4065]: NETFILTER_CFG table=filter:107 family=2 entries=13 op=nft_register_rule pid=4065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:54.422000 audit[4065]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffff46ce200 a2=0 a3=1 items=0 ppid=2103 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:54.434000 audit[4065]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=4065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:54.434000 audit[4065]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffff46ce200 a2=0 a3=1 items=0 ppid=2103 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.434000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:54.537075 systemd-networkd[1045]: calic06dc3a9716: Link UP May 13 00:40:54.538853 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic06dc3a9716: link becomes ready May 13 00:40:54.538697 systemd-networkd[1045]: calic06dc3a9716: Gained carrier May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.437 [INFO][4040] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0 calico-apiserver-65cf854b4- calico-apiserver c71d13a4-e163-400c-ad03-9388338c0caa 885 0 2025-05-13 00:40:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65cf854b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-65cf854b4-rlcz6 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic06dc3a9716 [] []}} ContainerID="1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-rlcz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.437 [INFO][4040] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-rlcz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.481 [INFO][4068] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" HandleID="k8s-pod-network.1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.492 [INFO][4068] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" HandleID="k8s-pod-network.1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40005a3700), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-65cf854b4-rlcz6", "timestamp":"2025-05-13 00:40:54.481528866 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.492 [INFO][4068] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.492 [INFO][4068] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.492 [INFO][4068] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.495 [INFO][4068] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" host="localhost" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.506 [INFO][4068] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.513 [INFO][4068] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.515 [INFO][4068] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.519 [INFO][4068] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.520 [INFO][4068] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" host="localhost" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.521 [INFO][4068] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523 May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.525 [INFO][4068] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" host="localhost" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.530 [INFO][4068] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" host="localhost" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.530 [INFO][4068] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" host="localhost" May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.530 [INFO][4068] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:54.553647 env[1216]: 2025-05-13 00:40:54.530 [INFO][4068] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" HandleID="k8s-pod-network.1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:40:54.554187 env[1216]: 2025-05-13 00:40:54.533 [INFO][4040] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-rlcz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0", GenerateName:"calico-apiserver-65cf854b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"c71d13a4-e163-400c-ad03-9388338c0caa", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65cf854b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-65cf854b4-rlcz6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic06dc3a9716", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:54.554187 env[1216]: 2025-05-13 00:40:54.533 [INFO][4040] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-rlcz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:40:54.554187 env[1216]: 2025-05-13 00:40:54.533 [INFO][4040] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic06dc3a9716 ContainerID="1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-rlcz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:40:54.554187 env[1216]: 2025-05-13 00:40:54.538 [INFO][4040] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-rlcz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:40:54.554187 env[1216]: 2025-05-13 00:40:54.538 [INFO][4040] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-rlcz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0", GenerateName:"calico-apiserver-65cf854b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"c71d13a4-e163-400c-ad03-9388338c0caa", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65cf854b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523", Pod:"calico-apiserver-65cf854b4-rlcz6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic06dc3a9716", MAC:"46:73:13:94:4e:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:54.554187 env[1216]: 2025-05-13 00:40:54.549 [INFO][4040] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523" Namespace="calico-apiserver" Pod="calico-apiserver-65cf854b4-rlcz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:40:54.556000 audit[4091]: NETFILTER_CFG table=filter:109 family=2 entries=46 op=nft_register_chain pid=4091 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:54.556000 audit[4091]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23892 a0=3 a1=ffffd2d83220 a2=0 a3=ffff89c0efa8 items=0 ppid=3175 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.556000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:54.567250 env[1216]: time="2025-05-13T00:40:54.567183883Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:54.567404 env[1216]: time="2025-05-13T00:40:54.567380295Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:54.567532 env[1216]: time="2025-05-13T00:40:54.567502942Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:54.567835 env[1216]: time="2025-05-13T00:40:54.567786600Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523 pid=4106 runtime=io.containerd.runc.v2 May 13 00:40:54.579986 systemd[1]: Started cri-containerd-1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523.scope. May 13 00:40:54.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit: BPF prog-id=185 op=LOAD May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4106 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363031366466316234643732376437333761356331656631383130 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4106 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363031366466316234643732376437333761356331656631383130 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit: BPF prog-id=186 op=LOAD May 13 00:40:54.602000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4106 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363031366466316234643732376437333761356331656631383130 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit: BPF prog-id=187 op=LOAD May 13 00:40:54.602000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4106 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363031366466316234643732376437333761356331656631383130 May 13 00:40:54.602000 audit: BPF prog-id=187 op=UNLOAD May 13 00:40:54.602000 audit: BPF prog-id=186 op=UNLOAD May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.602000 audit: BPF prog-id=188 op=LOAD May 13 00:40:54.602000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4106 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363031366466316234643732376437333761356331656631383130 May 13 00:40:54.606212 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:40:54.628124 env[1216]: time="2025-05-13T00:40:54.628077488Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65cf854b4-rlcz6,Uid:c71d13a4-e163-400c-ad03-9388338c0caa,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523\"" May 13 00:40:54.635339 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:40:54.635432 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali38b6b159689: link becomes ready May 13 00:40:54.633176 systemd-networkd[1045]: cali38b6b159689: Link UP May 13 00:40:54.635767 systemd-networkd[1045]: cali38b6b159689: Gained carrier May 13 00:40:54.636382 env[1216]: time="2025-05-13T00:40:54.636345040Z" level=info msg="CreateContainer within sandbox \"1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.455 [INFO][4045] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0 coredns-668d6bf9bc- kube-system 29fc948b-1295-4736-8ba8-8d4160e63002 886 0 2025-05-13 00:40:23 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-dkt4t eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali38b6b159689 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" Namespace="kube-system" Pod="coredns-668d6bf9bc-dkt4t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dkt4t-" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.455 [INFO][4045] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" Namespace="kube-system" Pod="coredns-668d6bf9bc-dkt4t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.494 [INFO][4075] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" HandleID="k8s-pod-network.f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.514 [INFO][4075] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" HandleID="k8s-pod-network.f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004e4e80), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-dkt4t", "timestamp":"2025-05-13 00:40:54.494878611 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.514 [INFO][4075] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.530 [INFO][4075] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.530 [INFO][4075] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.598 [INFO][4075] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" host="localhost" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.603 [INFO][4075] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.612 [INFO][4075] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.614 [INFO][4075] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.616 [INFO][4075] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.616 [INFO][4075] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" host="localhost" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.618 [INFO][4075] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100 May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.622 [INFO][4075] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" host="localhost" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.627 [INFO][4075] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" host="localhost" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.627 [INFO][4075] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" host="localhost" May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.628 [INFO][4075] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:54.651555 env[1216]: 2025-05-13 00:40:54.628 [INFO][4075] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" HandleID="k8s-pod-network.f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:40:54.652284 env[1216]: 2025-05-13 00:40:54.631 [INFO][4045] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" Namespace="kube-system" Pod="coredns-668d6bf9bc-dkt4t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"29fc948b-1295-4736-8ba8-8d4160e63002", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-dkt4t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali38b6b159689", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:54.652284 env[1216]: 2025-05-13 00:40:54.631 [INFO][4045] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" Namespace="kube-system" Pod="coredns-668d6bf9bc-dkt4t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:40:54.652284 env[1216]: 2025-05-13 00:40:54.631 [INFO][4045] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali38b6b159689 ContainerID="f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" Namespace="kube-system" Pod="coredns-668d6bf9bc-dkt4t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:40:54.652284 env[1216]: 2025-05-13 00:40:54.636 [INFO][4045] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" Namespace="kube-system" Pod="coredns-668d6bf9bc-dkt4t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:40:54.652284 env[1216]: 2025-05-13 00:40:54.636 [INFO][4045] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" Namespace="kube-system" Pod="coredns-668d6bf9bc-dkt4t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"29fc948b-1295-4736-8ba8-8d4160e63002", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100", Pod:"coredns-668d6bf9bc-dkt4t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali38b6b159689", MAC:"c2:5a:2e:03:c8:a9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:54.652284 env[1216]: 2025-05-13 00:40:54.649 [INFO][4045] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100" Namespace="kube-system" Pod="coredns-668d6bf9bc-dkt4t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:40:54.656093 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount725899991.mount: Deactivated successfully. May 13 00:40:54.663211 env[1216]: time="2025-05-13T00:40:54.663160098Z" level=info msg="CreateContainer within sandbox \"1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fa8b5c481160c10d8898b46fd4cc5bc4abc18e5c33bbde5495c593411b4a2182\"" May 13 00:40:54.663723 env[1216]: time="2025-05-13T00:40:54.663682130Z" level=info msg="StartContainer for \"fa8b5c481160c10d8898b46fd4cc5bc4abc18e5c33bbde5495c593411b4a2182\"" May 13 00:40:54.667000 audit[4160]: NETFILTER_CFG table=filter:110 family=2 entries=46 op=nft_register_chain pid=4160 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:54.667000 audit[4160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21784 a0=3 a1=ffffd2fd0db0 a2=0 a3=ffff961d2fa8 items=0 ppid=3175 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.667000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:54.670784 env[1216]: time="2025-05-13T00:40:54.670718365Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:54.670893 env[1216]: time="2025-05-13T00:40:54.670769288Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:54.670893 env[1216]: time="2025-05-13T00:40:54.670779889Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:54.670963 env[1216]: time="2025-05-13T00:40:54.670932019Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100 pid=4166 runtime=io.containerd.runc.v2 May 13 00:40:54.678749 systemd-networkd[1045]: caliaae2c3d6924: Gained IPv6LL May 13 00:40:54.680423 systemd[1]: Started cri-containerd-fa8b5c481160c10d8898b46fd4cc5bc4abc18e5c33bbde5495c593411b4a2182.scope. May 13 00:40:54.683328 systemd[1]: Started cri-containerd-f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100.scope. May 13 00:40:54.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.707000 audit: BPF prog-id=189 op=LOAD May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4166 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639633562303731393265623832383862633531333932626235356536 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4166 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639633562303731393265623832383862633531333932626235356536 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit: BPF prog-id=190 op=LOAD May 13 00:40:54.708000 audit[4179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4166 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639633562303731393265623832383862633531333932626235356536 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit: BPF prog-id=191 op=LOAD May 13 00:40:54.708000 audit[4179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4166 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639633562303731393265623832383862633531333932626235356536 May 13 00:40:54.708000 audit: BPF prog-id=191 op=UNLOAD May 13 00:40:54.708000 audit: BPF prog-id=190 op=UNLOAD May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.708000 audit: BPF prog-id=192 op=LOAD May 13 00:40:54.708000 audit[4179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4166 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639633562303731393265623832383862633531333932626235356536 May 13 00:40:54.711858 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:40:54.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit: BPF prog-id=193 op=LOAD May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4106 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661386235633438313136306331306438383938623436666434636335 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4106 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661386235633438313136306331306438383938623436666434636335 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit: BPF prog-id=194 op=LOAD May 13 00:40:54.713000 audit[4178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4106 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661386235633438313136306331306438383938623436666434636335 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit: BPF prog-id=195 op=LOAD May 13 00:40:54.713000 audit[4178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4106 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661386235633438313136306331306438383938623436666434636335 May 13 00:40:54.713000 audit: BPF prog-id=195 op=UNLOAD May 13 00:40:54.713000 audit: BPF prog-id=194 op=UNLOAD May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.713000 audit: BPF prog-id=196 op=LOAD May 13 00:40:54.713000 audit[4178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4106 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661386235633438313136306331306438383938623436666434636335 May 13 00:40:54.734424 env[1216]: time="2025-05-13T00:40:54.734377062Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-dkt4t,Uid:29fc948b-1295-4736-8ba8-8d4160e63002,Namespace:kube-system,Attempt:1,} returns sandbox id \"f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100\"" May 13 00:40:54.736189 kubelet[1956]: E0513 00:40:54.736150 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:54.739704 env[1216]: time="2025-05-13T00:40:54.739160758Z" level=info msg="CreateContainer within sandbox \"f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:40:54.745417 env[1216]: time="2025-05-13T00:40:54.745377742Z" level=info msg="StartContainer for \"fa8b5c481160c10d8898b46fd4cc5bc4abc18e5c33bbde5495c593411b4a2182\" returns successfully" May 13 00:40:54.752743 env[1216]: time="2025-05-13T00:40:54.752692115Z" level=info msg="CreateContainer within sandbox \"f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"fb4ca2651b7edb95018db8f8d746aec9b27b376eac2ed6bb37dbfaa00f4a17cb\"" May 13 00:40:54.754148 env[1216]: time="2025-05-13T00:40:54.753434801Z" level=info msg="StartContainer for \"fb4ca2651b7edb95018db8f8d746aec9b27b376eac2ed6bb37dbfaa00f4a17cb\"" May 13 00:40:54.771230 systemd[1]: Started cri-containerd-fb4ca2651b7edb95018db8f8d746aec9b27b376eac2ed6bb37dbfaa00f4a17cb.scope. May 13 00:40:54.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.791000 audit: BPF prog-id=197 op=LOAD May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4166 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662346361323635316237656462393530313864623866386437343661 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4166 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662346361323635316237656462393530313864623866386437343661 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit: BPF prog-id=198 op=LOAD May 13 00:40:54.809000 audit[4237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4166 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662346361323635316237656462393530313864623866386437343661 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit: BPF prog-id=199 op=LOAD May 13 00:40:54.809000 audit[4237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4166 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662346361323635316237656462393530313864623866386437343661 May 13 00:40:54.809000 audit: BPF prog-id=199 op=UNLOAD May 13 00:40:54.809000 audit: BPF prog-id=198 op=UNLOAD May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:54.809000 audit: BPF prog-id=200 op=LOAD May 13 00:40:54.809000 audit[4237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4166 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662346361323635316237656462393530313864623866386437343661 May 13 00:40:54.847249 env[1216]: time="2025-05-13T00:40:54.847202519Z" level=info msg="StartContainer for \"fb4ca2651b7edb95018db8f8d746aec9b27b376eac2ed6bb37dbfaa00f4a17cb\" returns successfully" May 13 00:40:54.870000 audit[4248]: AVC avc: denied { getattr } for pid=4248 comm="coredns" path="cgroup:[4026532378]" dev="nsfs" ino=4026532378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c430,c876 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 13 00:40:54.870000 audit[4248]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000054600 a2=40000da578 a3=0 items=0 ppid=4166 pid=4248 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c430,c876 key=(null) May 13 00:40:54.870000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 13 00:40:55.126629 systemd-networkd[1045]: calid0ecbd98031: Gained IPv6LL May 13 00:40:55.162000 audit[3935]: AVC avc: denied { watch } for pid=3935 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_40_38.2864118818/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c438,c805 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c438,c805 tclass=file permissive=0 May 13 00:40:55.162000 audit[3935]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4001914040 a2=fc6 a3=0 items=0 ppid=3537 pid=3935 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c438,c805 key=(null) May 13 00:40:55.162000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:40:55.331654 kubelet[1956]: E0513 00:40:55.330716 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:55.331654 kubelet[1956]: E0513 00:40:55.331230 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:55.350850 kubelet[1956]: I0513 00:40:55.350795 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65cf854b4-rlcz6" podStartSLOduration=25.35077731 podStartE2EDuration="25.35077731s" podCreationTimestamp="2025-05-13 00:40:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:40:55.341218094 +0000 UTC m=+40.239421443" watchObservedRunningTime="2025-05-13 00:40:55.35077731 +0000 UTC m=+40.248980619" May 13 00:40:55.359000 audit[4271]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=4271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:55.359000 audit[4271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff5378130 a2=0 a3=1 items=0 ppid=2103 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:55.368000 audit[4271]: NETFILTER_CFG table=nat:112 family=2 entries=27 op=nft_register_chain pid=4271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:55.368000 audit[4271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffff5378130 a2=0 a3=1 items=0 ppid=2103 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.368000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:55.735641 env[1216]: time="2025-05-13T00:40:55.735598621Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:55.736718 env[1216]: time="2025-05-13T00:40:55.736692607Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:55.738861 env[1216]: time="2025-05-13T00:40:55.738830415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:55.740048 env[1216]: time="2025-05-13T00:40:55.740021087Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:55.740686 env[1216]: time="2025-05-13T00:40:55.740660606Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 13 00:40:55.742561 env[1216]: time="2025-05-13T00:40:55.742536199Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:40:55.756967 env[1216]: time="2025-05-13T00:40:55.756888384Z" level=info msg="CreateContainer within sandbox \"898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 00:40:55.767120 env[1216]: time="2025-05-13T00:40:55.767082478Z" level=info msg="CreateContainer within sandbox \"898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"70c003e0799bb4f4903c7fcd6e373d4fec857de505dc368d4ceab9806ca783ec\"" May 13 00:40:55.768648 env[1216]: time="2025-05-13T00:40:55.768613330Z" level=info msg="StartContainer for \"70c003e0799bb4f4903c7fcd6e373d4fec857de505dc368d4ceab9806ca783ec\"" May 13 00:40:55.784745 systemd[1]: Started cri-containerd-70c003e0799bb4f4903c7fcd6e373d4fec857de505dc368d4ceab9806ca783ec.scope. May 13 00:40:55.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.806000 audit: BPF prog-id=201 op=LOAD May 13 00:40:55.807000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit[4282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3593 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730633030336530373939626234663439303363376663643665333733 May 13 00:40:55.807000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit[4282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3593 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730633030336530373939626234663439303363376663643665333733 May 13 00:40:55.807000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.807000 audit: BPF prog-id=202 op=LOAD May 13 00:40:55.807000 audit[4282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3593 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730633030336530373939626234663439303363376663643665333733 May 13 00:40:55.808000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.808000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.808000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.808000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.808000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.808000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.808000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.808000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.808000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.808000 audit: BPF prog-id=203 op=LOAD May 13 00:40:55.808000 audit[4282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3593 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730633030336530373939626234663439303363376663643665333733 May 13 00:40:55.809000 audit: BPF prog-id=203 op=UNLOAD May 13 00:40:55.809000 audit: BPF prog-id=202 op=UNLOAD May 13 00:40:55.809000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.809000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.809000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.809000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.809000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.809000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.809000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.809000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.809000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.809000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.809000 audit: BPF prog-id=204 op=LOAD May 13 00:40:55.809000 audit[4282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3593 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730633030336530373939626234663439303363376663643665333733 May 13 00:40:55.836428 env[1216]: time="2025-05-13T00:40:55.836379894Z" level=info msg="StartContainer for \"70c003e0799bb4f4903c7fcd6e373d4fec857de505dc368d4ceab9806ca783ec\" returns successfully" May 13 00:40:55.894808 systemd-networkd[1045]: calic06dc3a9716: Gained IPv6LL May 13 00:40:55.958646 systemd-networkd[1045]: cali38b6b159689: Gained IPv6LL May 13 00:40:56.234000 audit[4198]: AVC avc: denied { watch } for pid=4198 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_40_38.1990097930/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c790 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c581,c790 tclass=file permissive=0 May 13 00:40:56.234000 audit[4198]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40012f28e0 a2=fc6 a3=0 items=0 ppid=4106 pid=4198 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c790 key=(null) May 13 00:40:56.234000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:40:56.334391 kubelet[1956]: E0513 00:40:56.334357 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:56.335358 kubelet[1956]: I0513 00:40:56.335325 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:40:56.344472 kubelet[1956]: I0513 00:40:56.344411 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-dkt4t" podStartSLOduration=33.344396121 podStartE2EDuration="33.344396121s" podCreationTimestamp="2025-05-13 00:40:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:40:55.35193554 +0000 UTC m=+40.250138889" watchObservedRunningTime="2025-05-13 00:40:56.344396121 +0000 UTC m=+41.242599430" May 13 00:40:56.388000 audit[4318]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=4318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:56.388000 audit[4318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc8233660 a2=0 a3=1 items=0 ppid=2103 pid=4318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:56.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:56.399000 audit[4318]: NETFILTER_CFG table=nat:114 family=2 entries=58 op=nft_register_chain pid=4318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:56.399000 audit[4318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20628 a0=3 a1=ffffc8233660 a2=0 a3=1 items=0 ppid=2103 pid=4318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:56.399000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:56.836593 env[1216]: time="2025-05-13T00:40:56.836528372Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:56.838065 env[1216]: time="2025-05-13T00:40:56.838039421Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:56.839514 env[1216]: time="2025-05-13T00:40:56.839463504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:56.840759 env[1216]: time="2025-05-13T00:40:56.840736659Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:56.841123 env[1216]: time="2025-05-13T00:40:56.841097960Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 13 00:40:56.844867 env[1216]: time="2025-05-13T00:40:56.844828380Z" level=info msg="CreateContainer within sandbox \"a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:40:56.857173 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount577068963.mount: Deactivated successfully. May 13 00:40:56.858505 env[1216]: time="2025-05-13T00:40:56.858453981Z" level=info msg="CreateContainer within sandbox \"a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"04133ca9211d4b82fec3fccd01aa2021a86e142718b5de5b14177b34f06771a5\"" May 13 00:40:56.858994 env[1216]: time="2025-05-13T00:40:56.858971571Z" level=info msg="StartContainer for \"04133ca9211d4b82fec3fccd01aa2021a86e142718b5de5b14177b34f06771a5\"" May 13 00:40:56.878345 systemd[1]: Started cri-containerd-04133ca9211d4b82fec3fccd01aa2021a86e142718b5de5b14177b34f06771a5.scope. May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3791 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:56.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034313333636139323131643462383266656333666363643031616132 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit: BPF prog-id=205 op=LOAD May 13 00:40:56.900000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3791 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:56.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034313333636139323131643462383266656333666363643031616132 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit: BPF prog-id=206 op=LOAD May 13 00:40:56.900000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3791 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:56.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034313333636139323131643462383266656333666363643031616132 May 13 00:40:56.900000 audit: BPF prog-id=206 op=UNLOAD May 13 00:40:56.900000 audit: BPF prog-id=205 op=UNLOAD May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:56.900000 audit: BPF prog-id=207 op=LOAD May 13 00:40:56.900000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3791 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:56.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034313333636139323131643462383266656333666363643031616132 May 13 00:40:56.911892 env[1216]: time="2025-05-13T00:40:56.911832199Z" level=info msg="StartContainer for \"04133ca9211d4b82fec3fccd01aa2021a86e142718b5de5b14177b34f06771a5\" returns successfully" May 13 00:40:56.914523 env[1216]: time="2025-05-13T00:40:56.914482514Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:40:57.336946 kubelet[1956]: E0513 00:40:57.336899 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:57.337291 kubelet[1956]: I0513 00:40:57.337277 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:40:58.152964 env[1216]: time="2025-05-13T00:40:58.152912125Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:58.154569 env[1216]: time="2025-05-13T00:40:58.154532696Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:58.156484 env[1216]: time="2025-05-13T00:40:58.156453004Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:58.158351 env[1216]: time="2025-05-13T00:40:58.158318028Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:58.158863 env[1216]: time="2025-05-13T00:40:58.158837897Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 13 00:40:58.162634 env[1216]: time="2025-05-13T00:40:58.162599668Z" level=info msg="CreateContainer within sandbox \"a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:40:58.176662 env[1216]: time="2025-05-13T00:40:58.176618295Z" level=info msg="CreateContainer within sandbox \"a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"442d00ffbc2e555ebd3ae714d5fcbdaa5e70f8dfb21d2324a0a28d01b36765a2\"" May 13 00:40:58.177257 env[1216]: time="2025-05-13T00:40:58.177114803Z" level=info msg="StartContainer for \"442d00ffbc2e555ebd3ae714d5fcbdaa5e70f8dfb21d2324a0a28d01b36765a2\"" May 13 00:40:58.195375 systemd[1]: Started cri-containerd-442d00ffbc2e555ebd3ae714d5fcbdaa5e70f8dfb21d2324a0a28d01b36765a2.scope. May 13 00:40:58.220000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.223810 kernel: kauditd_printk_skb: 627 callbacks suppressed May 13 00:40:58.223878 kernel: audit: type=1400 audit(1747096858.220:1389): avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.223912 kernel: audit: type=1300 audit(1747096858.220:1389): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3791 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:58.220000 audit[4368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3791 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:58.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326430306666626332653535356562643361653731346435666362 May 13 00:40:58.230558 kernel: audit: type=1327 audit(1747096858.220:1389): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326430306666626332653535356562643361653731346435666362 May 13 00:40:58.220000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.233045 kernel: audit: type=1400 audit(1747096858.220:1390): avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.220000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.235518 kernel: audit: type=1400 audit(1747096858.220:1390): avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.235590 kernel: audit: type=1400 audit(1747096858.220:1390): avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.220000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.220000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.240380 kernel: audit: type=1400 audit(1747096858.220:1390): avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.220000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.243775 kernel: audit: type=1400 audit(1747096858.220:1390): avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.220000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.247289 kernel: audit: type=1400 audit(1747096858.220:1390): avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.247368 kernel: audit: type=1400 audit(1747096858.220:1390): avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.220000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.220000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.220000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.220000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.220000 audit: BPF prog-id=208 op=LOAD May 13 00:40:58.220000 audit[4368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3791 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:58.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326430306666626332653535356562643361653731346435666362 May 13 00:40:58.223000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.223000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.223000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.223000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.223000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.223000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.223000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.223000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.223000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.223000 audit: BPF prog-id=209 op=LOAD May 13 00:40:58.223000 audit[4368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3791 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:58.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326430306666626332653535356562643361653731346435666362 May 13 00:40:58.227000 audit: BPF prog-id=209 op=UNLOAD May 13 00:40:58.227000 audit: BPF prog-id=208 op=UNLOAD May 13 00:40:58.227000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.227000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.227000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.227000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.227000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.227000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.227000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.227000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.227000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.227000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:58.227000 audit: BPF prog-id=210 op=LOAD May 13 00:40:58.227000 audit[4368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3791 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:58.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326430306666626332653535356562643361653731346435666362 May 13 00:40:58.253412 env[1216]: time="2025-05-13T00:40:58.253366001Z" level=info msg="StartContainer for \"442d00ffbc2e555ebd3ae714d5fcbdaa5e70f8dfb21d2324a0a28d01b36765a2\" returns successfully" May 13 00:40:58.351279 kubelet[1956]: I0513 00:40:58.351227 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-644fd5b575-vcg45" podStartSLOduration=24.349095473 podStartE2EDuration="28.35120581s" podCreationTimestamp="2025-05-13 00:40:30 +0000 UTC" firstStartedPulling="2025-05-13 00:40:51.739629374 +0000 UTC m=+36.637832723" lastFinishedPulling="2025-05-13 00:40:55.741739711 +0000 UTC m=+40.639943060" observedRunningTime="2025-05-13 00:40:56.344859948 +0000 UTC m=+41.243063377" watchObservedRunningTime="2025-05-13 00:40:58.35120581 +0000 UTC m=+43.249409159" May 13 00:40:58.351664 kubelet[1956]: I0513 00:40:58.351354 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-wnv28" podStartSLOduration=23.993193834 podStartE2EDuration="28.351348698s" podCreationTimestamp="2025-05-13 00:40:30 +0000 UTC" firstStartedPulling="2025-05-13 00:40:53.801847619 +0000 UTC m=+38.700050968" lastFinishedPulling="2025-05-13 00:40:58.160002483 +0000 UTC m=+43.058205832" observedRunningTime="2025-05-13 00:40:58.350941235 +0000 UTC m=+43.249144584" watchObservedRunningTime="2025-05-13 00:40:58.351348698 +0000 UTC m=+43.249552047" May 13 00:40:58.412644 systemd[1]: run-containerd-runc-k8s.io-442d00ffbc2e555ebd3ae714d5fcbdaa5e70f8dfb21d2324a0a28d01b36765a2-runc.kw1A5f.mount: Deactivated successfully. May 13 00:40:58.827660 systemd[1]: Started sshd@12-10.0.0.136:22-10.0.0.1:49058.service. May 13 00:40:58.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.136:22-10.0.0.1:49058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:58.869000 audit[4400]: USER_ACCT pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:58.869971 sshd[4400]: Accepted publickey for core from 10.0.0.1 port 49058 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:58.870000 audit[4400]: CRED_ACQ pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:58.870000 audit[4400]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff167ef80 a2=3 a3=1 items=0 ppid=1 pid=4400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:58.870000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:40:58.871300 sshd[4400]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:58.875419 systemd-logind[1204]: New session 13 of user core. May 13 00:40:58.875903 systemd[1]: Started session-13.scope. May 13 00:40:58.879000 audit[4400]: USER_START pid=4400 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:58.880000 audit[4402]: CRED_ACQ pid=4402 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:59.066924 sshd[4400]: pam_unix(sshd:session): session closed for user core May 13 00:40:59.067000 audit[4400]: USER_END pid=4400 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:59.067000 audit[4400]: CRED_DISP pid=4400 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:59.069707 systemd[1]: sshd@12-10.0.0.136:22-10.0.0.1:49058.service: Deactivated successfully. May 13 00:40:59.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.136:22-10.0.0.1:49058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:59.070521 systemd[1]: session-13.scope: Deactivated successfully. May 13 00:40:59.071057 systemd-logind[1204]: Session 13 logged out. Waiting for processes to exit. May 13 00:40:59.071893 systemd-logind[1204]: Removed session 13. May 13 00:40:59.260016 kubelet[1956]: I0513 00:40:59.259956 1956 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:40:59.263422 kubelet[1956]: I0513 00:40:59.263390 1956 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:40:59.451892 kubelet[1956]: I0513 00:40:59.451832 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:40:59.514573 systemd[1]: run-containerd-runc-k8s.io-70c003e0799bb4f4903c7fcd6e373d4fec857de505dc368d4ceab9806ca783ec-runc.tfRvn6.mount: Deactivated successfully. May 13 00:41:04.072269 systemd[1]: Started sshd@13-10.0.0.136:22-10.0.0.1:57550.service. May 13 00:41:04.074603 kernel: kauditd_printk_skb: 44 callbacks suppressed May 13 00:41:04.074916 kernel: audit: type=1130 audit(1747096864.071:1404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.136:22-10.0.0.1:57550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:04.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.136:22-10.0.0.1:57550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:04.116000 audit[4459]: USER_ACCT pid=4459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.117683 sshd[4459]: Accepted publickey for core from 10.0.0.1 port 57550 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:41:04.118377 sshd[4459]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:04.117000 audit[4459]: CRED_ACQ pid=4459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.120982 kernel: audit: type=1101 audit(1747096864.116:1405): pid=4459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.121025 kernel: audit: type=1103 audit(1747096864.117:1406): pid=4459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.127098 kernel: audit: type=1006 audit(1747096864.117:1407): pid=4459 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 13 00:41:04.117000 audit[4459]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffeed8e00 a2=3 a3=1 items=0 ppid=1 pid=4459 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:04.130502 kernel: audit: type=1300 audit(1747096864.117:1407): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffeed8e00 a2=3 a3=1 items=0 ppid=1 pid=4459 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:04.117000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:04.131632 systemd-logind[1204]: New session 14 of user core. May 13 00:41:04.131764 systemd[1]: Started session-14.scope. May 13 00:41:04.132796 kernel: audit: type=1327 audit(1747096864.117:1407): proctitle=737368643A20636F7265205B707269765D May 13 00:41:04.140000 audit[4459]: USER_START pid=4459 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.145541 kernel: audit: type=1105 audit(1747096864.140:1408): pid=4459 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.145605 kernel: audit: type=1103 audit(1747096864.145:1409): pid=4461 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.145000 audit[4461]: CRED_ACQ pid=4461 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.267362 sshd[4459]: pam_unix(sshd:session): session closed for user core May 13 00:41:04.271000 audit[4459]: USER_END pid=4459 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.276626 systemd[1]: sshd@13-10.0.0.136:22-10.0.0.1:57550.service: Deactivated successfully. May 13 00:41:04.277394 systemd[1]: session-14.scope: Deactivated successfully. May 13 00:41:04.271000 audit[4459]: CRED_DISP pid=4459 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.280750 kernel: audit: type=1106 audit(1747096864.271:1410): pid=4459 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.280816 kernel: audit: type=1104 audit(1747096864.271:1411): pid=4459 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:04.280871 systemd-logind[1204]: Session 14 logged out. Waiting for processes to exit. May 13 00:41:04.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.136:22-10.0.0.1:57550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:04.281602 systemd-logind[1204]: Removed session 14. May 13 00:41:09.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.136:22-10.0.0.1:57558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:09.272062 systemd[1]: Started sshd@14-10.0.0.136:22-10.0.0.1:57558.service. May 13 00:41:09.273252 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:41:09.273312 kernel: audit: type=1130 audit(1747096869.270:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.136:22-10.0.0.1:57558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:09.311000 audit[4481]: USER_ACCT pid=4481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:09.313462 sshd[4481]: Accepted publickey for core from 10.0.0.1 port 57558 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:41:09.314633 sshd[4481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:09.312000 audit[4481]: CRED_ACQ pid=4481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:09.320093 kernel: audit: type=1101 audit(1747096869.311:1414): pid=4481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:09.320303 kernel: audit: type=1103 audit(1747096869.312:1415): pid=4481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:09.320330 kernel: audit: type=1006 audit(1747096869.312:1416): pid=4481 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 13 00:41:09.319167 systemd-logind[1204]: New session 15 of user core. May 13 00:41:09.319987 systemd[1]: Started session-15.scope. May 13 00:41:09.312000 audit[4481]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc28c2c30 a2=3 a3=1 items=0 ppid=1 pid=4481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:09.324109 kernel: audit: type=1300 audit(1747096869.312:1416): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc28c2c30 a2=3 a3=1 items=0 ppid=1 pid=4481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:09.324163 kernel: audit: type=1327 audit(1747096869.312:1416): proctitle=737368643A20636F7265205B707269765D May 13 00:41:09.312000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:09.322000 audit[4481]: USER_START pid=4481 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:09.328422 kernel: audit: type=1105 audit(1747096869.322:1417): pid=4481 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:09.328468 kernel: audit: type=1103 audit(1747096869.323:1418): pid=4483 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:09.323000 audit[4483]: CRED_ACQ pid=4483 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:09.451593 sshd[4481]: pam_unix(sshd:session): session closed for user core May 13 00:41:09.451000 audit[4481]: USER_END pid=4481 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:09.454336 systemd[1]: sshd@14-10.0.0.136:22-10.0.0.1:57558.service: Deactivated successfully. May 13 00:41:09.455096 systemd[1]: session-15.scope: Deactivated successfully. May 13 00:41:09.455717 systemd-logind[1204]: Session 15 logged out. Waiting for processes to exit. May 13 00:41:09.456294 systemd-logind[1204]: Removed session 15. May 13 00:41:09.456536 kernel: audit: type=1106 audit(1747096869.451:1419): pid=4481 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:09.451000 audit[4481]: CRED_DISP pid=4481 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:09.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.136:22-10.0.0.1:57558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:09.459556 kernel: audit: type=1104 audit(1747096869.451:1420): pid=4481 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:12.888000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:12.888000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=400dc56a20 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:41:12.888000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:41:12.889000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:12.889000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=400ea3acc0 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:41:12.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:41:12.889000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:12.889000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=400ea3acf0 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:41:12.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:41:12.889000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:12.889000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=400db3cba0 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:41:12.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:41:12.889000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:12.889000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=400e9963c0 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:41:12.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:41:12.889000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:12.889000 audit[1847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=400e7105a0 a2=fc6 a3=0 items=0 ppid=1674 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c775 key=(null) May 13 00:41:12.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 13 00:41:14.080000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:14.080000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000dc7e00 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:41:14.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:41:14.080000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:14.080000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400114e870 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:41:14.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:41:14.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.136:22-10.0.0.1:35594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:14.456424 systemd[1]: Started sshd@15-10.0.0.136:22-10.0.0.1:35594.service. May 13 00:41:14.459896 kernel: kauditd_printk_skb: 25 callbacks suppressed May 13 00:41:14.459972 kernel: audit: type=1130 audit(1747096874.455:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.136:22-10.0.0.1:35594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:14.496000 audit[4494]: USER_ACCT pid=4494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.498737 sshd[4494]: Accepted publickey for core from 10.0.0.1 port 35594 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:41:14.500035 sshd[4494]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:14.498000 audit[4494]: CRED_ACQ pid=4494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.503232 systemd-logind[1204]: New session 16 of user core. May 13 00:41:14.504010 systemd[1]: Started session-16.scope. May 13 00:41:14.504360 kernel: audit: type=1101 audit(1747096874.496:1431): pid=4494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.504407 kernel: audit: type=1103 audit(1747096874.498:1432): pid=4494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.506168 kernel: audit: type=1006 audit(1747096874.498:1433): pid=4494 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 13 00:41:14.506224 kernel: audit: type=1300 audit(1747096874.498:1433): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff619f290 a2=3 a3=1 items=0 ppid=1 pid=4494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:14.498000 audit[4494]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff619f290 a2=3 a3=1 items=0 ppid=1 pid=4494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:14.498000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:14.510332 kernel: audit: type=1327 audit(1747096874.498:1433): proctitle=737368643A20636F7265205B707269765D May 13 00:41:14.510379 kernel: audit: type=1105 audit(1747096874.506:1434): pid=4494 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.506000 audit[4494]: USER_START pid=4494 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.507000 audit[4496]: CRED_ACQ pid=4496 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.516314 kernel: audit: type=1103 audit(1747096874.507:1435): pid=4496 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.620249 sshd[4494]: pam_unix(sshd:session): session closed for user core May 13 00:41:14.620000 audit[4494]: USER_END pid=4494 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.623394 systemd[1]: Started sshd@16-10.0.0.136:22-10.0.0.1:35602.service. May 13 00:41:14.624013 systemd-logind[1204]: Session 16 logged out. Waiting for processes to exit. May 13 00:41:14.624260 systemd[1]: sshd@15-10.0.0.136:22-10.0.0.1:35594.service: Deactivated successfully. May 13 00:41:14.625005 systemd[1]: session-16.scope: Deactivated successfully. May 13 00:41:14.620000 audit[4494]: CRED_DISP pid=4494 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.625961 systemd-logind[1204]: Removed session 16. May 13 00:41:14.627986 kernel: audit: type=1106 audit(1747096874.620:1436): pid=4494 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.628033 kernel: audit: type=1104 audit(1747096874.620:1437): pid=4494 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.136:22-10.0.0.1:35602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:14.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.136:22-10.0.0.1:35594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:14.664000 audit[4506]: USER_ACCT pid=4506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.666070 sshd[4506]: Accepted publickey for core from 10.0.0.1 port 35602 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:41:14.665000 audit[4506]: CRED_ACQ pid=4506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.665000 audit[4506]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5b86fd0 a2=3 a3=1 items=0 ppid=1 pid=4506 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:14.665000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:14.667471 sshd[4506]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:14.671219 systemd-logind[1204]: New session 17 of user core. May 13 00:41:14.672188 systemd[1]: Started session-17.scope. May 13 00:41:14.674000 audit[4506]: USER_START pid=4506 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.675000 audit[4509]: CRED_ACQ pid=4509 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.885242 sshd[4506]: pam_unix(sshd:session): session closed for user core May 13 00:41:14.885000 audit[4506]: USER_END pid=4506 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.885000 audit[4506]: CRED_DISP pid=4506 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.136:22-10.0.0.1:35614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:14.888540 systemd[1]: Started sshd@17-10.0.0.136:22-10.0.0.1:35614.service. May 13 00:41:14.893602 systemd[1]: session-17.scope: Deactivated successfully. May 13 00:41:14.894541 systemd-logind[1204]: Session 17 logged out. Waiting for processes to exit. May 13 00:41:14.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.136:22-10.0.0.1:35602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:14.894599 systemd[1]: sshd@16-10.0.0.136:22-10.0.0.1:35602.service: Deactivated successfully. May 13 00:41:14.895749 systemd-logind[1204]: Removed session 17. May 13 00:41:14.927000 audit[4519]: USER_ACCT pid=4519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.928856 sshd[4519]: Accepted publickey for core from 10.0.0.1 port 35614 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:41:14.928000 audit[4519]: CRED_ACQ pid=4519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.928000 audit[4519]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd654ff20 a2=3 a3=1 items=0 ppid=1 pid=4519 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:14.928000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:14.929994 sshd[4519]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:14.933890 systemd-logind[1204]: New session 18 of user core. May 13 00:41:14.934096 systemd[1]: Started session-18.scope. May 13 00:41:14.936000 audit[4519]: USER_START pid=4519 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:14.937000 audit[4522]: CRED_ACQ pid=4522 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:15.184398 env[1216]: time="2025-05-13T00:41:15.184358549Z" level=info msg="StopPodSandbox for \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\"" May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.226 [WARNING][4544] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wnv28-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7fb607c6-e13a-4bd1-be40-1ff0cacb38e0", ResourceVersion:"967", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841", Pod:"csi-node-driver-wnv28", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaae2c3d6924", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.227 [INFO][4544] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.227 [INFO][4544] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" iface="eth0" netns="" May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.227 [INFO][4544] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.227 [INFO][4544] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.253 [INFO][4554] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" HandleID="k8s-pod-network.a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.253 [INFO][4554] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.253 [INFO][4554] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.261 [WARNING][4554] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" HandleID="k8s-pod-network.a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.261 [INFO][4554] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" HandleID="k8s-pod-network.a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.263 [INFO][4554] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:15.265991 env[1216]: 2025-05-13 00:41:15.264 [INFO][4544] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:41:15.266806 env[1216]: time="2025-05-13T00:41:15.266027111Z" level=info msg="TearDown network for sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\" successfully" May 13 00:41:15.266806 env[1216]: time="2025-05-13T00:41:15.266058032Z" level=info msg="StopPodSandbox for \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\" returns successfully" May 13 00:41:15.266806 env[1216]: time="2025-05-13T00:41:15.266790024Z" level=info msg="RemovePodSandbox for \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\"" May 13 00:41:15.266879 env[1216]: time="2025-05-13T00:41:15.266824305Z" level=info msg="Forcibly stopping sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\"" May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.299 [WARNING][4579] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wnv28-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7fb607c6-e13a-4bd1-be40-1ff0cacb38e0", ResourceVersion:"967", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a710d390c9e279040d97ea537d0a94f02c167cbe17ac0272148a536626eae841", Pod:"csi-node-driver-wnv28", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaae2c3d6924", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.299 [INFO][4579] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.299 [INFO][4579] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" iface="eth0" netns="" May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.299 [INFO][4579] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.299 [INFO][4579] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.321 [INFO][4587] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" HandleID="k8s-pod-network.a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.321 [INFO][4587] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.321 [INFO][4587] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.329 [WARNING][4587] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" HandleID="k8s-pod-network.a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.329 [INFO][4587] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" HandleID="k8s-pod-network.a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" Workload="localhost-k8s-csi--node--driver--wnv28-eth0" May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.331 [INFO][4587] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:15.336241 env[1216]: 2025-05-13 00:41:15.334 [INFO][4579] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955" May 13 00:41:15.336714 env[1216]: time="2025-05-13T00:41:15.336263300Z" level=info msg="TearDown network for sandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\" successfully" May 13 00:41:15.343954 env[1216]: time="2025-05-13T00:41:15.343907750Z" level=info msg="RemovePodSandbox \"a20a52d5640a59e4c39ede2af264a514174f781b554c0cbe20c90a418d8ee955\" returns successfully" May 13 00:41:15.344435 env[1216]: time="2025-05-13T00:41:15.344407851Z" level=info msg="StopPodSandbox for \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\"" May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.383 [WARNING][4609] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"29fc948b-1295-4736-8ba8-8d4160e63002", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100", Pod:"coredns-668d6bf9bc-dkt4t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali38b6b159689", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.384 [INFO][4609] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.384 [INFO][4609] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" iface="eth0" netns="" May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.384 [INFO][4609] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.384 [INFO][4609] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.405 [INFO][4620] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" HandleID="k8s-pod-network.1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.405 [INFO][4620] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.405 [INFO][4620] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.418 [WARNING][4620] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" HandleID="k8s-pod-network.1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.418 [INFO][4620] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" HandleID="k8s-pod-network.1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.420 [INFO][4620] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:15.423407 env[1216]: 2025-05-13 00:41:15.422 [INFO][4609] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:41:15.423993 env[1216]: time="2025-05-13T00:41:15.423947801Z" level=info msg="TearDown network for sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\" successfully" May 13 00:41:15.424074 env[1216]: time="2025-05-13T00:41:15.424050166Z" level=info msg="StopPodSandbox for \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\" returns successfully" May 13 00:41:15.424848 env[1216]: time="2025-05-13T00:41:15.424822239Z" level=info msg="RemovePodSandbox for \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\"" May 13 00:41:15.424976 env[1216]: time="2025-05-13T00:41:15.424936284Z" level=info msg="Forcibly stopping sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\"" May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.483 [WARNING][4645] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"29fc948b-1295-4736-8ba8-8d4160e63002", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f9c5b07192eb8288bc51392bb55e65b2c80a47d169b6e69366470057f17de100", Pod:"coredns-668d6bf9bc-dkt4t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali38b6b159689", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.483 [INFO][4645] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.483 [INFO][4645] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" iface="eth0" netns="" May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.483 [INFO][4645] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.483 [INFO][4645] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.507 [INFO][4654] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" HandleID="k8s-pod-network.1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.509 [INFO][4654] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.509 [INFO][4654] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.517 [WARNING][4654] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" HandleID="k8s-pod-network.1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.517 [INFO][4654] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" HandleID="k8s-pod-network.1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" Workload="localhost-k8s-coredns--668d6bf9bc--dkt4t-eth0" May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.519 [INFO][4654] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:15.523632 env[1216]: 2025-05-13 00:41:15.521 [INFO][4645] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d" May 13 00:41:15.524233 env[1216]: time="2025-05-13T00:41:15.524181284Z" level=info msg="TearDown network for sandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\" successfully" May 13 00:41:15.526855 env[1216]: time="2025-05-13T00:41:15.526819078Z" level=info msg="RemovePodSandbox \"1be89e1240fb7e5fddc3d1e7e88a8057518e8aa1624fd8380e382a577842d09d\" returns successfully" May 13 00:41:15.527443 env[1216]: time="2025-05-13T00:41:15.527416143Z" level=info msg="StopPodSandbox for \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\"" May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.578 [WARNING][4676] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0", GenerateName:"calico-apiserver-65cf854b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"c71d13a4-e163-400c-ad03-9388338c0caa", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65cf854b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523", Pod:"calico-apiserver-65cf854b4-rlcz6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic06dc3a9716", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.578 [INFO][4676] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.578 [INFO][4676] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" iface="eth0" netns="" May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.578 [INFO][4676] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.578 [INFO][4676] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.607 [INFO][4684] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" HandleID="k8s-pod-network.b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.608 [INFO][4684] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.608 [INFO][4684] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.629 [WARNING][4684] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" HandleID="k8s-pod-network.b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.629 [INFO][4684] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" HandleID="k8s-pod-network.b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.631 [INFO][4684] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:15.634913 env[1216]: 2025-05-13 00:41:15.633 [INFO][4676] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:41:15.635430 env[1216]: time="2025-05-13T00:41:15.635387000Z" level=info msg="TearDown network for sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\" successfully" May 13 00:41:15.635517 env[1216]: time="2025-05-13T00:41:15.635480524Z" level=info msg="StopPodSandbox for \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\" returns successfully" May 13 00:41:15.636128 env[1216]: time="2025-05-13T00:41:15.636101351Z" level=info msg="RemovePodSandbox for \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\"" May 13 00:41:15.636201 env[1216]: time="2025-05-13T00:41:15.636137432Z" level=info msg="Forcibly stopping sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\"" May 13 00:41:15.714000 audit[4721]: NETFILTER_CFG table=filter:115 family=2 entries=20 op=nft_register_rule pid=4721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:15.714000 audit[4721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffe53e9780 a2=0 a3=1 items=0 ppid=2103 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:15.714000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:15.720294 sshd[4519]: pam_unix(sshd:session): session closed for user core May 13 00:41:15.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.136:22-10.0.0.1:35626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:15.723763 systemd[1]: Started sshd@18-10.0.0.136:22-10.0.0.1:35626.service. May 13 00:41:15.725000 audit[4519]: USER_END pid=4519 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:15.725000 audit[4721]: NETFILTER_CFG table=nat:116 family=2 entries=22 op=nft_register_rule pid=4721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:15.725000 audit[4519]: CRED_DISP pid=4519 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:15.725000 audit[4721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe53e9780 a2=0 a3=1 items=0 ppid=2103 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:15.725000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:15.727409 systemd[1]: sshd@17-10.0.0.136:22-10.0.0.1:35614.service: Deactivated successfully. May 13 00:41:15.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.136:22-10.0.0.1:35614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:15.728143 systemd[1]: session-18.scope: Deactivated successfully. May 13 00:41:15.728861 systemd-logind[1204]: Session 18 logged out. Waiting for processes to exit. May 13 00:41:15.729913 systemd-logind[1204]: Removed session 18. May 13 00:41:15.754000 audit[4729]: NETFILTER_CFG table=filter:117 family=2 entries=32 op=nft_register_rule pid=4729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:15.754000 audit[4729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff69549c0 a2=0 a3=1 items=0 ppid=2103 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:15.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.686 [WARNING][4707] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0", GenerateName:"calico-apiserver-65cf854b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"c71d13a4-e163-400c-ad03-9388338c0caa", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65cf854b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1d6016df1b4d727d737a5c1ef18102ad9ac3eca1f671cef0113241d96349b523", Pod:"calico-apiserver-65cf854b4-rlcz6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic06dc3a9716", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.686 [INFO][4707] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.686 [INFO][4707] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" iface="eth0" netns="" May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.686 [INFO][4707] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.686 [INFO][4707] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.733 [INFO][4715] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" HandleID="k8s-pod-network.b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.733 [INFO][4715] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.733 [INFO][4715] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.749 [WARNING][4715] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" HandleID="k8s-pod-network.b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.749 [INFO][4715] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" HandleID="k8s-pod-network.b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" Workload="localhost-k8s-calico--apiserver--65cf854b4--rlcz6-eth0" May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.752 [INFO][4715] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:15.755227 env[1216]: 2025-05-13 00:41:15.753 [INFO][4707] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef" May 13 00:41:15.755665 env[1216]: time="2025-05-13T00:41:15.755254529Z" level=info msg="TearDown network for sandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\" successfully" May 13 00:41:15.758704 env[1216]: time="2025-05-13T00:41:15.758658596Z" level=info msg="RemovePodSandbox \"b4c40c3b0f6dae8be224df89a5ce30df0623decc39774e2f16d9286eb25801ef\" returns successfully" May 13 00:41:15.759153 env[1216]: time="2025-05-13T00:41:15.759129216Z" level=info msg="StopPodSandbox for \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\"" May 13 00:41:15.760000 audit[4729]: NETFILTER_CFG table=nat:118 family=2 entries=22 op=nft_register_rule pid=4729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:15.760000 audit[4729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff69549c0 a2=0 a3=1 items=0 ppid=2103 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:15.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:15.767000 audit[4723]: USER_ACCT pid=4723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:15.767793 sshd[4723]: Accepted publickey for core from 10.0.0.1 port 35626 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:41:15.768000 audit[4723]: CRED_ACQ pid=4723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:15.768000 audit[4723]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdafada00 a2=3 a3=1 items=0 ppid=1 pid=4723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:15.768000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:15.769137 sshd[4723]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:15.773111 systemd-logind[1204]: New session 19 of user core. May 13 00:41:15.773577 systemd[1]: Started session-19.scope. May 13 00:41:15.778000 audit[4723]: USER_START pid=4723 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:15.780000 audit[4751]: CRED_ACQ pid=4751 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.801 [WARNING][4745] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0", GenerateName:"calico-apiserver-65cf854b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"e75667cf-26ee-4cdb-a7fe-64c643e5e0f4", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65cf854b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073", Pod:"calico-apiserver-65cf854b4-kcm5m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif7d144e9623", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.801 [INFO][4745] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.801 [INFO][4745] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" iface="eth0" netns="" May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.801 [INFO][4745] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.801 [INFO][4745] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.819 [INFO][4754] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" HandleID="k8s-pod-network.b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.819 [INFO][4754] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.819 [INFO][4754] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.827 [WARNING][4754] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" HandleID="k8s-pod-network.b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.827 [INFO][4754] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" HandleID="k8s-pod-network.b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.829 [INFO][4754] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:15.834954 env[1216]: 2025-05-13 00:41:15.833 [INFO][4745] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:41:15.835385 env[1216]: time="2025-05-13T00:41:15.834977687Z" level=info msg="TearDown network for sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\" successfully" May 13 00:41:15.835385 env[1216]: time="2025-05-13T00:41:15.835008288Z" level=info msg="StopPodSandbox for \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\" returns successfully" May 13 00:41:15.835861 env[1216]: time="2025-05-13T00:41:15.835832204Z" level=info msg="RemovePodSandbox for \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\"" May 13 00:41:15.835947 env[1216]: time="2025-05-13T00:41:15.835897327Z" level=info msg="Forcibly stopping sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\"" May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.877 [WARNING][4781] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0", GenerateName:"calico-apiserver-65cf854b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"e75667cf-26ee-4cdb-a7fe-64c643e5e0f4", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65cf854b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aa8ea501fbbe96119a58d7aeba6eb7375f4cd41bf7106b3d16fc9cfb90746073", Pod:"calico-apiserver-65cf854b4-kcm5m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif7d144e9623", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.877 [INFO][4781] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.878 [INFO][4781] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" iface="eth0" netns="" May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.878 [INFO][4781] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.878 [INFO][4781] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.904 [INFO][4791] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" HandleID="k8s-pod-network.b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.904 [INFO][4791] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.904 [INFO][4791] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.913 [WARNING][4791] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" HandleID="k8s-pod-network.b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.913 [INFO][4791] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" HandleID="k8s-pod-network.b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" Workload="localhost-k8s-calico--apiserver--65cf854b4--kcm5m-eth0" May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.914 [INFO][4791] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:15.920014 env[1216]: 2025-05-13 00:41:15.916 [INFO][4781] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2" May 13 00:41:15.920014 env[1216]: time="2025-05-13T00:41:15.920026715Z" level=info msg="TearDown network for sandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\" successfully" May 13 00:41:15.922714 env[1216]: time="2025-05-13T00:41:15.922675389Z" level=info msg="RemovePodSandbox \"b42efe5f52d14327a136e156a54d5872b1c0c0eddd0ace538a08491a09e64ac2\" returns successfully" May 13 00:41:15.926015 env[1216]: time="2025-05-13T00:41:15.925975171Z" level=info msg="StopPodSandbox for \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\"" May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:15.970 [WARNING][4815] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d98p4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"7acf1133-f126-4ff5-9211-a424f15ef5ea", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c", Pod:"coredns-668d6bf9bc-d98p4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid0ecbd98031", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:15.970 [INFO][4815] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:15.970 [INFO][4815] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" iface="eth0" netns="" May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:15.970 [INFO][4815] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:15.970 [INFO][4815] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:15.998 [INFO][4823] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" HandleID="k8s-pod-network.e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:15.998 [INFO][4823] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:15.998 [INFO][4823] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:16.007 [WARNING][4823] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" HandleID="k8s-pod-network.e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:16.007 [INFO][4823] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" HandleID="k8s-pod-network.e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:16.008 [INFO][4823] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:16.011302 env[1216]: 2025-05-13 00:41:16.009 [INFO][4815] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:41:16.011756 env[1216]: time="2025-05-13T00:41:16.011342888Z" level=info msg="TearDown network for sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\" successfully" May 13 00:41:16.011756 env[1216]: time="2025-05-13T00:41:16.011375930Z" level=info msg="StopPodSandbox for \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\" returns successfully" May 13 00:41:16.012272 env[1216]: time="2025-05-13T00:41:16.012231726Z" level=info msg="RemovePodSandbox for \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\"" May 13 00:41:16.012327 env[1216]: time="2025-05-13T00:41:16.012283129Z" level=info msg="Forcibly stopping sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\"" May 13 00:41:16.065707 sshd[4723]: pam_unix(sshd:session): session closed for user core May 13 00:41:16.068000 audit[4723]: USER_END pid=4723 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:16.068000 audit[4723]: CRED_DISP pid=4723 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:16.070075 systemd[1]: Started sshd@19-10.0.0.136:22-10.0.0.1:35630.service. May 13 00:41:16.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.136:22-10.0.0.1:35630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:16.071133 systemd[1]: sshd@18-10.0.0.136:22-10.0.0.1:35626.service: Deactivated successfully. May 13 00:41:16.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.136:22-10.0.0.1:35626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:16.071909 systemd[1]: session-19.scope: Deactivated successfully. May 13 00:41:16.078384 systemd-logind[1204]: Session 19 logged out. Waiting for processes to exit. May 13 00:41:16.080400 systemd-logind[1204]: Removed session 19. May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.064 [WARNING][4845] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d98p4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"7acf1133-f126-4ff5-9211-a424f15ef5ea", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"60f01ce59e9866553e5fc9873758ecf442e085b91f8283fca6084f8179316b2c", Pod:"coredns-668d6bf9bc-d98p4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid0ecbd98031", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.064 [INFO][4845] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.064 [INFO][4845] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" iface="eth0" netns="" May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.064 [INFO][4845] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.064 [INFO][4845] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.099 [INFO][4854] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" HandleID="k8s-pod-network.e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.099 [INFO][4854] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.099 [INFO][4854] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.108 [WARNING][4854] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" HandleID="k8s-pod-network.e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.108 [INFO][4854] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" HandleID="k8s-pod-network.e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" Workload="localhost-k8s-coredns--668d6bf9bc--d98p4-eth0" May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.109 [INFO][4854] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:16.112712 env[1216]: 2025-05-13 00:41:16.111 [INFO][4845] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597" May 13 00:41:16.113138 env[1216]: time="2025-05-13T00:41:16.112744140Z" level=info msg="TearDown network for sandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\" successfully" May 13 00:41:16.115642 env[1216]: time="2025-05-13T00:41:16.115600982Z" level=info msg="RemovePodSandbox \"e100fc7089d9e4cc38cbb1afb7eab6e6a965fd60260286f3bd3f0d36f564c597\" returns successfully" May 13 00:41:16.116134 env[1216]: time="2025-05-13T00:41:16.116105204Z" level=info msg="StopPodSandbox for \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\"" May 13 00:41:16.117000 audit[4856]: USER_ACCT pid=4856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:16.117817 sshd[4856]: Accepted publickey for core from 10.0.0.1 port 35630 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:41:16.118000 audit[4856]: CRED_ACQ pid=4856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:16.118000 audit[4856]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca07a4c0 a2=3 a3=1 items=0 ppid=1 pid=4856 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:16.118000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:16.119391 sshd[4856]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:16.123585 systemd-logind[1204]: New session 20 of user core. May 13 00:41:16.123750 systemd[1]: Started session-20.scope. May 13 00:41:16.127000 audit[4856]: USER_START pid=4856 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:16.128000 audit[4885]: CRED_ACQ pid=4885 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.169 [WARNING][4881] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0", GenerateName:"calico-kube-controllers-644fd5b575-", Namespace:"calico-system", SelfLink:"", UID:"c3d6465d-07e8-4406-9026-a105e339cb72", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"644fd5b575", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b", Pod:"calico-kube-controllers-644fd5b575-vcg45", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2c6818f20b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.169 [INFO][4881] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.169 [INFO][4881] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" iface="eth0" netns="" May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.169 [INFO][4881] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.169 [INFO][4881] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.189 [INFO][4890] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" HandleID="k8s-pod-network.726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.189 [INFO][4890] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.189 [INFO][4890] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.203 [WARNING][4890] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" HandleID="k8s-pod-network.726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.203 [INFO][4890] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" HandleID="k8s-pod-network.726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.204 [INFO][4890] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:16.207548 env[1216]: 2025-05-13 00:41:16.206 [INFO][4881] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:41:16.208425 env[1216]: time="2025-05-13T00:41:16.207576591Z" level=info msg="TearDown network for sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\" successfully" May 13 00:41:16.208425 env[1216]: time="2025-05-13T00:41:16.207612553Z" level=info msg="StopPodSandbox for \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\" returns successfully" May 13 00:41:16.208425 env[1216]: time="2025-05-13T00:41:16.208095373Z" level=info msg="RemovePodSandbox for \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\"" May 13 00:41:16.208425 env[1216]: time="2025-05-13T00:41:16.208138815Z" level=info msg="Forcibly stopping sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\"" May 13 00:41:16.282916 sshd[4856]: pam_unix(sshd:session): session closed for user core May 13 00:41:16.284000 audit[4856]: USER_END pid=4856 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:16.284000 audit[4856]: CRED_DISP pid=4856 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:16.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.136:22-10.0.0.1:35630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:16.286093 systemd[1]: sshd@19-10.0.0.136:22-10.0.0.1:35630.service: Deactivated successfully. May 13 00:41:16.286852 systemd[1]: session-20.scope: Deactivated successfully. May 13 00:41:16.287331 systemd-logind[1204]: Session 20 logged out. Waiting for processes to exit. May 13 00:41:16.288038 systemd-logind[1204]: Removed session 20. May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.251 [WARNING][4921] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0", GenerateName:"calico-kube-controllers-644fd5b575-", Namespace:"calico-system", SelfLink:"", UID:"c3d6465d-07e8-4406-9026-a105e339cb72", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"644fd5b575", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"898f9fd484f7dc4d953bc164ac9cfb44d69ddf738ad303536984762ecbf9515b", Pod:"calico-kube-controllers-644fd5b575-vcg45", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2c6818f20b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.251 [INFO][4921] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.251 [INFO][4921] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" iface="eth0" netns="" May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.251 [INFO][4921] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.251 [INFO][4921] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.275 [INFO][4930] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" HandleID="k8s-pod-network.726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.275 [INFO][4930] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.275 [INFO][4930] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.284 [WARNING][4930] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" HandleID="k8s-pod-network.726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.284 [INFO][4930] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" HandleID="k8s-pod-network.726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" Workload="localhost-k8s-calico--kube--controllers--644fd5b575--vcg45-eth0" May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.287 [INFO][4930] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:16.291092 env[1216]: 2025-05-13 00:41:16.289 [INFO][4921] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c" May 13 00:41:16.291768 env[1216]: time="2025-05-13T00:41:16.291733386Z" level=info msg="TearDown network for sandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\" successfully" May 13 00:41:16.295033 env[1216]: time="2025-05-13T00:41:16.295002206Z" level=info msg="RemovePodSandbox \"726a32d31b6f8956594104dbd26419a4f7c3ba9d92fc7b1fa032151249ee619c\" returns successfully" May 13 00:41:16.354996 kubelet[1956]: E0513 00:41:16.354906 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:41:18.020000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:18.020000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400108f9a0 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:41:18.020000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:41:18.020000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:18.020000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002405f20 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:41:18.020000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:41:18.020000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:18.020000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40011891a0 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:41:18.020000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:41:18.020000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:41:18.020000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400114d4e0 a2=fc6 a3=0 items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c66,c166 key=(null) May 13 00:41:18.020000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:41:21.280000 audit[4961]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=4961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:21.281922 kernel: kauditd_printk_skb: 69 callbacks suppressed May 13 00:41:21.281979 kernel: audit: type=1325 audit(1747096881.280:1483): table=filter:119 family=2 entries=20 op=nft_register_rule pid=4961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:21.280000 audit[4961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc89d1af0 a2=0 a3=1 items=0 ppid=2103 pid=4961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:21.287480 kernel: audit: type=1300 audit(1747096881.280:1483): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc89d1af0 a2=0 a3=1 items=0 ppid=2103 pid=4961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:21.287563 kernel: audit: type=1327 audit(1747096881.280:1483): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:21.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:21.287712 systemd[1]: Started sshd@20-10.0.0.136:22-10.0.0.1:35634.service. May 13 00:41:21.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.136:22-10.0.0.1:35634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:21.292793 kernel: audit: type=1130 audit(1747096881.287:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.136:22-10.0.0.1:35634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:21.294000 audit[4961]: NETFILTER_CFG table=nat:120 family=2 entries=106 op=nft_register_chain pid=4961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:21.294000 audit[4961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffc89d1af0 a2=0 a3=1 items=0 ppid=2103 pid=4961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:21.302082 kernel: audit: type=1325 audit(1747096881.294:1485): table=nat:120 family=2 entries=106 op=nft_register_chain pid=4961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:21.302179 kernel: audit: type=1300 audit(1747096881.294:1485): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffc89d1af0 a2=0 a3=1 items=0 ppid=2103 pid=4961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:21.302211 kernel: audit: type=1327 audit(1747096881.294:1485): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:21.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:21.331000 audit[4963]: USER_ACCT pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:21.332307 sshd[4963]: Accepted publickey for core from 10.0.0.1 port 35634 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:41:21.333948 sshd[4963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:21.333000 audit[4963]: CRED_ACQ pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:21.338575 kernel: audit: type=1101 audit(1747096881.331:1486): pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:21.338651 kernel: audit: type=1103 audit(1747096881.333:1487): pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:21.338678 kernel: audit: type=1006 audit(1747096881.333:1488): pid=4963 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 13 00:41:21.338184 systemd[1]: Started session-21.scope. May 13 00:41:21.338953 systemd-logind[1204]: New session 21 of user core. May 13 00:41:21.333000 audit[4963]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee2438a0 a2=3 a3=1 items=0 ppid=1 pid=4963 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:21.333000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:21.343000 audit[4963]: USER_START pid=4963 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:21.345000 audit[4965]: CRED_ACQ pid=4965 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:21.467751 sshd[4963]: pam_unix(sshd:session): session closed for user core May 13 00:41:21.468000 audit[4963]: USER_END pid=4963 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:21.468000 audit[4963]: CRED_DISP pid=4963 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:21.471236 systemd[1]: sshd@20-10.0.0.136:22-10.0.0.1:35634.service: Deactivated successfully. May 13 00:41:21.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.136:22-10.0.0.1:35634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:21.471972 systemd[1]: session-21.scope: Deactivated successfully. May 13 00:41:21.472298 systemd-logind[1204]: Session 21 logged out. Waiting for processes to exit. May 13 00:41:21.473115 systemd-logind[1204]: Removed session 21. May 13 00:41:23.200361 kubelet[1956]: E0513 00:41:23.200326 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:41:26.200171 kubelet[1956]: E0513 00:41:26.200133 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:41:26.472225 systemd[1]: Started sshd@21-10.0.0.136:22-10.0.0.1:58466.service. May 13 00:41:26.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.136:22-10.0.0.1:58466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:26.473561 kernel: kauditd_printk_skb: 7 callbacks suppressed May 13 00:41:26.473618 kernel: audit: type=1130 audit(1747096886.471:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.136:22-10.0.0.1:58466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:26.512000 audit[4980]: USER_ACCT pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.512924 sshd[4980]: Accepted publickey for core from 10.0.0.1 port 58466 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:41:26.514082 sshd[4980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:26.513000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.518800 kernel: audit: type=1101 audit(1747096886.512:1495): pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.518836 kernel: audit: type=1103 audit(1747096886.513:1496): pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.520776 kernel: audit: type=1006 audit(1747096886.513:1497): pid=4980 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 13 00:41:26.513000 audit[4980]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe979b180 a2=3 a3=1 items=0 ppid=1 pid=4980 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:26.524521 kernel: audit: type=1300 audit(1747096886.513:1497): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe979b180 a2=3 a3=1 items=0 ppid=1 pid=4980 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:26.513000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:26.525952 kernel: audit: type=1327 audit(1747096886.513:1497): proctitle=737368643A20636F7265205B707269765D May 13 00:41:26.528571 systemd-logind[1204]: New session 22 of user core. May 13 00:41:26.528983 systemd[1]: Started session-22.scope. May 13 00:41:26.532000 audit[4980]: USER_START pid=4980 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.536510 kernel: audit: type=1105 audit(1747096886.532:1498): pid=4980 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.536000 audit[4988]: CRED_ACQ pid=4988 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.539518 kernel: audit: type=1103 audit(1747096886.536:1499): pid=4988 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.694346 sshd[4980]: pam_unix(sshd:session): session closed for user core May 13 00:41:26.694000 audit[4980]: USER_END pid=4980 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.696805 systemd[1]: sshd@21-10.0.0.136:22-10.0.0.1:58466.service: Deactivated successfully. May 13 00:41:26.697540 systemd[1]: session-22.scope: Deactivated successfully. May 13 00:41:26.702667 kernel: audit: type=1106 audit(1747096886.694:1500): pid=4980 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.702726 kernel: audit: type=1104 audit(1747096886.694:1501): pid=4980 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.694000 audit[4980]: CRED_DISP pid=4980 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:26.702941 systemd-logind[1204]: Session 22 logged out. Waiting for processes to exit. May 13 00:41:26.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.136:22-10.0.0.1:58466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:26.703599 systemd-logind[1204]: Removed session 22. May 13 00:41:27.232463 kubelet[1956]: I0513 00:41:27.232418 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:41:27.267000 audit[5001]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=5001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:27.267000 audit[5001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff9789a80 a2=0 a3=1 items=0 ppid=2103 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:27.267000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:27.277000 audit[5001]: NETFILTER_CFG table=nat:122 family=2 entries=58 op=nft_register_chain pid=5001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:27.277000 audit[5001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=fffff9789a80 a2=0 a3=1 items=0 ppid=2103 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:27.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:31.699199 systemd[1]: Started sshd@22-10.0.0.136:22-10.0.0.1:58478.service. May 13 00:41:31.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.136:22-10.0.0.1:58478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:31.700623 kernel: kauditd_printk_skb: 7 callbacks suppressed May 13 00:41:31.700662 kernel: audit: type=1130 audit(1747096891.698:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.136:22-10.0.0.1:58478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:31.745000 audit[5022]: USER_ACCT pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.746602 sshd[5022]: Accepted publickey for core from 10.0.0.1 port 58478 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:41:31.747796 sshd[5022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:31.746000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.751699 kernel: audit: type=1101 audit(1747096891.745:1506): pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.751771 kernel: audit: type=1103 audit(1747096891.746:1507): pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.751795 kernel: audit: type=1006 audit(1747096891.746:1508): pid=5022 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 13 00:41:31.752168 systemd-logind[1204]: New session 23 of user core. May 13 00:41:31.752991 systemd[1]: Started session-23.scope. May 13 00:41:31.753632 kernel: audit: type=1300 audit(1747096891.746:1508): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0648420 a2=3 a3=1 items=0 ppid=1 pid=5022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.746000 audit[5022]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0648420 a2=3 a3=1 items=0 ppid=1 pid=5022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.746000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:31.757788 kernel: audit: type=1327 audit(1747096891.746:1508): proctitle=737368643A20636F7265205B707269765D May 13 00:41:31.757825 kernel: audit: type=1105 audit(1747096891.753:1509): pid=5022 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.753000 audit[5022]: USER_START pid=5022 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.756000 audit[5024]: CRED_ACQ pid=5024 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.763902 kernel: audit: type=1103 audit(1747096891.756:1510): pid=5024 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.887074 sshd[5022]: pam_unix(sshd:session): session closed for user core May 13 00:41:31.887000 audit[5022]: USER_END pid=5022 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.889337 systemd[1]: session-23.scope: Deactivated successfully. May 13 00:41:31.889911 systemd[1]: sshd@22-10.0.0.136:22-10.0.0.1:58478.service: Deactivated successfully. May 13 00:41:31.890912 systemd-logind[1204]: Session 23 logged out. Waiting for processes to exit. May 13 00:41:31.891505 systemd-logind[1204]: Removed session 23. May 13 00:41:31.887000 audit[5022]: CRED_DISP pid=5022 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.894650 kernel: audit: type=1106 audit(1747096891.887:1511): pid=5022 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.894715 kernel: audit: type=1104 audit(1747096891.887:1512): pid=5022 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:31.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.136:22-10.0.0.1:58478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:34.199749 kubelet[1956]: E0513 00:41:34.199703 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:41:36.891916 systemd[1]: Started sshd@23-10.0.0.136:22-10.0.0.1:34556.service. May 13 00:41:36.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.136:22-10.0.0.1:34556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:36.895771 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:41:36.895824 kernel: audit: type=1130 audit(1747096896.891:1514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.136:22-10.0.0.1:34556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:36.928000 audit[5038]: USER_ACCT pid=5038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:36.929408 sshd[5038]: Accepted publickey for core from 10.0.0.1 port 34556 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:41:36.930541 sshd[5038]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:41:36.929000 audit[5038]: CRED_ACQ pid=5038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:36.935454 kernel: audit: type=1101 audit(1747096896.928:1515): pid=5038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:36.935557 kernel: audit: type=1103 audit(1747096896.929:1516): pid=5038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:36.935612 kernel: audit: type=1006 audit(1747096896.929:1517): pid=5038 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 13 00:41:36.929000 audit[5038]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd884bd50 a2=3 a3=1 items=0 ppid=1 pid=5038 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:36.940654 kernel: audit: type=1300 audit(1747096896.929:1517): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd884bd50 a2=3 a3=1 items=0 ppid=1 pid=5038 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:36.929000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:41:36.941874 kernel: audit: type=1327 audit(1747096896.929:1517): proctitle=737368643A20636F7265205B707269765D May 13 00:41:36.942142 systemd-logind[1204]: New session 24 of user core. May 13 00:41:36.942941 systemd[1]: Started session-24.scope. May 13 00:41:36.945000 audit[5038]: USER_START pid=5038 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:36.946000 audit[5040]: CRED_ACQ pid=5040 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:36.952064 kernel: audit: type=1105 audit(1747096896.945:1518): pid=5038 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:36.952150 kernel: audit: type=1103 audit(1747096896.946:1519): pid=5040 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:37.065236 sshd[5038]: pam_unix(sshd:session): session closed for user core May 13 00:41:37.065000 audit[5038]: USER_END pid=5038 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:37.067923 systemd[1]: sshd@23-10.0.0.136:22-10.0.0.1:34556.service: Deactivated successfully. May 13 00:41:37.068685 systemd[1]: session-24.scope: Deactivated successfully. May 13 00:41:37.065000 audit[5038]: CRED_DISP pid=5038 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:37.072771 kernel: audit: type=1106 audit(1747096897.065:1520): pid=5038 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:37.072818 kernel: audit: type=1104 audit(1747096897.065:1521): pid=5038 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:41:37.072992 systemd-logind[1204]: Session 24 logged out. Waiting for processes to exit. May 13 00:41:37.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.136:22-10.0.0.1:34556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:41:37.073732 systemd-logind[1204]: Removed session 24. May 13 00:41:38.200024 kubelet[1956]: E0513 00:41:38.199988 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"