May 14 00:31:22.728787 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 14 00:31:22.728808 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Tue May 13 23:17:31 -00 2025 May 14 00:31:22.728816 kernel: efi: EFI v2.70 by EDK II May 14 00:31:22.728822 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 14 00:31:22.728827 kernel: random: crng init done May 14 00:31:22.728833 kernel: ACPI: Early table checksum verification disabled May 14 00:31:22.728839 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 14 00:31:22.728846 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 14 00:31:22.728852 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:31:22.728857 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:31:22.728863 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:31:22.728868 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:31:22.728873 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:31:22.728879 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:31:22.728887 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:31:22.728893 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:31:22.728899 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:31:22.728905 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 14 00:31:22.728911 kernel: NUMA: Failed to initialise from firmware May 14 00:31:22.728917 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:31:22.728922 kernel: NUMA: NODE_DATA [mem 0xdcb09900-0xdcb0efff] May 14 00:31:22.728928 kernel: Zone ranges: May 14 00:31:22.728934 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:31:22.728941 kernel: DMA32 empty May 14 00:31:22.728946 kernel: Normal empty May 14 00:31:22.728952 kernel: Movable zone start for each node May 14 00:31:22.728958 kernel: Early memory node ranges May 14 00:31:22.728963 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 14 00:31:22.728969 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 14 00:31:22.728975 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 14 00:31:22.728981 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 14 00:31:22.728986 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 14 00:31:22.728992 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 14 00:31:22.728998 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 14 00:31:22.729004 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:31:22.729010 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 14 00:31:22.729016 kernel: psci: probing for conduit method from ACPI. May 14 00:31:22.729022 kernel: psci: PSCIv1.1 detected in firmware. May 14 00:31:22.729027 kernel: psci: Using standard PSCI v0.2 function IDs May 14 00:31:22.729033 kernel: psci: Trusted OS migration not required May 14 00:31:22.729041 kernel: psci: SMC Calling Convention v1.1 May 14 00:31:22.729048 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 14 00:31:22.729055 kernel: ACPI: SRAT not present May 14 00:31:22.729061 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 14 00:31:22.729067 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 14 00:31:22.729074 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 14 00:31:22.729080 kernel: Detected PIPT I-cache on CPU0 May 14 00:31:22.729086 kernel: CPU features: detected: GIC system register CPU interface May 14 00:31:22.729092 kernel: CPU features: detected: Hardware dirty bit management May 14 00:31:22.729098 kernel: CPU features: detected: Spectre-v4 May 14 00:31:22.729105 kernel: CPU features: detected: Spectre-BHB May 14 00:31:22.729112 kernel: CPU features: kernel page table isolation forced ON by KASLR May 14 00:31:22.729118 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 14 00:31:22.729124 kernel: CPU features: detected: ARM erratum 1418040 May 14 00:31:22.729131 kernel: CPU features: detected: SSBS not fully self-synchronizing May 14 00:31:22.729137 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 14 00:31:22.729143 kernel: Policy zone: DMA May 14 00:31:22.729150 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=412b3b42de04d7d5abb18ecf506be3ad2c72d6425f1b2391aa97d359e8bd9923 May 14 00:31:22.729157 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 14 00:31:22.729163 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 14 00:31:22.729169 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 14 00:31:22.729180 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 14 00:31:22.729187 kernel: Memory: 2457332K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36480K init, 777K bss, 114956K reserved, 0K cma-reserved) May 14 00:31:22.729194 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 14 00:31:22.729200 kernel: trace event string verifier disabled May 14 00:31:22.729206 kernel: rcu: Preemptible hierarchical RCU implementation. May 14 00:31:22.729213 kernel: rcu: RCU event tracing is enabled. May 14 00:31:22.729219 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 14 00:31:22.729225 kernel: Trampoline variant of Tasks RCU enabled. May 14 00:31:22.729232 kernel: Tracing variant of Tasks RCU enabled. May 14 00:31:22.729238 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 14 00:31:22.729244 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 14 00:31:22.729250 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 14 00:31:22.729257 kernel: GICv3: 256 SPIs implemented May 14 00:31:22.729264 kernel: GICv3: 0 Extended SPIs implemented May 14 00:31:22.729270 kernel: GICv3: Distributor has no Range Selector support May 14 00:31:22.729276 kernel: Root IRQ handler: gic_handle_irq May 14 00:31:22.729282 kernel: GICv3: 16 PPIs implemented May 14 00:31:22.729288 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 14 00:31:22.729294 kernel: ACPI: SRAT not present May 14 00:31:22.729300 kernel: ITS [mem 0x08080000-0x0809ffff] May 14 00:31:22.729306 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 14 00:31:22.729313 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 14 00:31:22.729319 kernel: GICv3: using LPI property table @0x00000000400d0000 May 14 00:31:22.729325 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 14 00:31:22.729333 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:31:22.729339 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 14 00:31:22.729345 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 14 00:31:22.729352 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 14 00:31:22.729358 kernel: arm-pv: using stolen time PV May 14 00:31:22.729364 kernel: Console: colour dummy device 80x25 May 14 00:31:22.729371 kernel: ACPI: Core revision 20210730 May 14 00:31:22.729382 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 14 00:31:22.729389 kernel: pid_max: default: 32768 minimum: 301 May 14 00:31:22.729396 kernel: LSM: Security Framework initializing May 14 00:31:22.729403 kernel: SELinux: Initializing. May 14 00:31:22.729410 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 14 00:31:22.729417 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 14 00:31:22.729423 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 14 00:31:22.729429 kernel: rcu: Hierarchical SRCU implementation. May 14 00:31:22.729436 kernel: Platform MSI: ITS@0x8080000 domain created May 14 00:31:22.729442 kernel: PCI/MSI: ITS@0x8080000 domain created May 14 00:31:22.729449 kernel: Remapping and enabling EFI services. May 14 00:31:22.729455 kernel: smp: Bringing up secondary CPUs ... May 14 00:31:22.729462 kernel: Detected PIPT I-cache on CPU1 May 14 00:31:22.729469 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 14 00:31:22.729475 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 14 00:31:22.729481 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:31:22.729488 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 14 00:31:22.729494 kernel: Detected PIPT I-cache on CPU2 May 14 00:31:22.729501 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 14 00:31:22.729507 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 14 00:31:22.729514 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:31:22.729520 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 14 00:31:22.729527 kernel: Detected PIPT I-cache on CPU3 May 14 00:31:22.729534 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 14 00:31:22.729540 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 14 00:31:22.729547 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:31:22.729557 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 14 00:31:22.729565 kernel: smp: Brought up 1 node, 4 CPUs May 14 00:31:22.729572 kernel: SMP: Total of 4 processors activated. May 14 00:31:22.729579 kernel: CPU features: detected: 32-bit EL0 Support May 14 00:31:22.729585 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 14 00:31:22.729592 kernel: CPU features: detected: Common not Private translations May 14 00:31:22.729599 kernel: CPU features: detected: CRC32 instructions May 14 00:31:22.729606 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 14 00:31:22.729614 kernel: CPU features: detected: LSE atomic instructions May 14 00:31:22.729621 kernel: CPU features: detected: Privileged Access Never May 14 00:31:22.729627 kernel: CPU features: detected: RAS Extension Support May 14 00:31:22.729634 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 14 00:31:22.729641 kernel: CPU: All CPU(s) started at EL1 May 14 00:31:22.729649 kernel: alternatives: patching kernel code May 14 00:31:22.729655 kernel: devtmpfs: initialized May 14 00:31:22.729662 kernel: KASLR enabled May 14 00:31:22.729669 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 14 00:31:22.729675 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 14 00:31:22.729682 kernel: pinctrl core: initialized pinctrl subsystem May 14 00:31:22.729689 kernel: SMBIOS 3.0.0 present. May 14 00:31:22.729696 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 14 00:31:22.729702 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 14 00:31:22.729710 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 14 00:31:22.729717 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 14 00:31:22.729724 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 14 00:31:22.729731 kernel: audit: initializing netlink subsys (disabled) May 14 00:31:22.729738 kernel: audit: type=2000 audit(0.034:1): state=initialized audit_enabled=0 res=1 May 14 00:31:22.729745 kernel: thermal_sys: Registered thermal governor 'step_wise' May 14 00:31:22.729751 kernel: cpuidle: using governor menu May 14 00:31:22.729758 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 14 00:31:22.729765 kernel: ASID allocator initialised with 32768 entries May 14 00:31:22.729772 kernel: ACPI: bus type PCI registered May 14 00:31:22.729796 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 14 00:31:22.729803 kernel: Serial: AMBA PL011 UART driver May 14 00:31:22.729810 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 14 00:31:22.729816 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 14 00:31:22.729823 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 14 00:31:22.729830 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 14 00:31:22.729837 kernel: cryptd: max_cpu_qlen set to 1000 May 14 00:31:22.729844 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 14 00:31:22.729852 kernel: ACPI: Added _OSI(Module Device) May 14 00:31:22.729858 kernel: ACPI: Added _OSI(Processor Device) May 14 00:31:22.729865 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 14 00:31:22.729872 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 14 00:31:22.729878 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 14 00:31:22.729885 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 14 00:31:22.729892 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 14 00:31:22.729899 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 14 00:31:22.729905 kernel: ACPI: Interpreter enabled May 14 00:31:22.729913 kernel: ACPI: Using GIC for interrupt routing May 14 00:31:22.729920 kernel: ACPI: MCFG table detected, 1 entries May 14 00:31:22.729926 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 14 00:31:22.729933 kernel: printk: console [ttyAMA0] enabled May 14 00:31:22.729940 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 14 00:31:22.730069 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 14 00:31:22.730136 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 14 00:31:22.730198 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 14 00:31:22.730257 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 14 00:31:22.730314 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 14 00:31:22.730323 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 14 00:31:22.730330 kernel: PCI host bridge to bus 0000:00 May 14 00:31:22.730408 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 14 00:31:22.730470 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 14 00:31:22.730523 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 14 00:31:22.730578 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 14 00:31:22.730652 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 14 00:31:22.730728 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 14 00:31:22.730808 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 14 00:31:22.730872 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 14 00:31:22.730934 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 14 00:31:22.731000 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 14 00:31:22.731060 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 14 00:31:22.731120 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 14 00:31:22.731175 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 14 00:31:22.731993 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 14 00:31:22.732084 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 14 00:31:22.732095 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 14 00:31:22.732102 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 14 00:31:22.732113 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 14 00:31:22.732120 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 14 00:31:22.732127 kernel: iommu: Default domain type: Translated May 14 00:31:22.732134 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 14 00:31:22.732141 kernel: vgaarb: loaded May 14 00:31:22.732147 kernel: pps_core: LinuxPPS API ver. 1 registered May 14 00:31:22.732155 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 14 00:31:22.732161 kernel: PTP clock support registered May 14 00:31:22.732168 kernel: Registered efivars operations May 14 00:31:22.732176 kernel: clocksource: Switched to clocksource arch_sys_counter May 14 00:31:22.732183 kernel: VFS: Disk quotas dquot_6.6.0 May 14 00:31:22.732190 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 14 00:31:22.732197 kernel: pnp: PnP ACPI init May 14 00:31:22.732271 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 14 00:31:22.732282 kernel: pnp: PnP ACPI: found 1 devices May 14 00:31:22.732289 kernel: NET: Registered PF_INET protocol family May 14 00:31:22.732295 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 14 00:31:22.732304 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 14 00:31:22.732311 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 14 00:31:22.732318 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 14 00:31:22.732324 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 14 00:31:22.732331 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 14 00:31:22.732338 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 14 00:31:22.732345 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 14 00:31:22.732352 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 14 00:31:22.732359 kernel: PCI: CLS 0 bytes, default 64 May 14 00:31:22.732367 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 14 00:31:22.732373 kernel: kvm [1]: HYP mode not available May 14 00:31:22.732390 kernel: Initialise system trusted keyrings May 14 00:31:22.732397 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 14 00:31:22.732404 kernel: Key type asymmetric registered May 14 00:31:22.732410 kernel: Asymmetric key parser 'x509' registered May 14 00:31:22.732417 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 14 00:31:22.732424 kernel: io scheduler mq-deadline registered May 14 00:31:22.732431 kernel: io scheduler kyber registered May 14 00:31:22.732440 kernel: io scheduler bfq registered May 14 00:31:22.732447 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 14 00:31:22.732453 kernel: ACPI: button: Power Button [PWRB] May 14 00:31:22.732460 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 14 00:31:22.732528 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 14 00:31:22.732538 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 14 00:31:22.732545 kernel: thunder_xcv, ver 1.0 May 14 00:31:22.732552 kernel: thunder_bgx, ver 1.0 May 14 00:31:22.732559 kernel: nicpf, ver 1.0 May 14 00:31:22.732567 kernel: nicvf, ver 1.0 May 14 00:31:22.732647 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 14 00:31:22.732704 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-14T00:31:22 UTC (1747182682) May 14 00:31:22.732713 kernel: hid: raw HID events driver (C) Jiri Kosina May 14 00:31:22.732720 kernel: NET: Registered PF_INET6 protocol family May 14 00:31:22.732727 kernel: Segment Routing with IPv6 May 14 00:31:22.732733 kernel: In-situ OAM (IOAM) with IPv6 May 14 00:31:22.732740 kernel: NET: Registered PF_PACKET protocol family May 14 00:31:22.732748 kernel: Key type dns_resolver registered May 14 00:31:22.732755 kernel: registered taskstats version 1 May 14 00:31:22.732762 kernel: Loading compiled-in X.509 certificates May 14 00:31:22.732769 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 7727f4e7680a5b8534f3d5e7bb84b1f695e8c34b' May 14 00:31:22.732837 kernel: Key type .fscrypt registered May 14 00:31:22.732845 kernel: Key type fscrypt-provisioning registered May 14 00:31:22.732853 kernel: ima: No TPM chip found, activating TPM-bypass! May 14 00:31:22.732860 kernel: ima: Allocated hash algorithm: sha1 May 14 00:31:22.732867 kernel: ima: No architecture policies found May 14 00:31:22.732876 kernel: clk: Disabling unused clocks May 14 00:31:22.732883 kernel: Freeing unused kernel memory: 36480K May 14 00:31:22.732890 kernel: Run /init as init process May 14 00:31:22.732896 kernel: with arguments: May 14 00:31:22.732903 kernel: /init May 14 00:31:22.732910 kernel: with environment: May 14 00:31:22.732916 kernel: HOME=/ May 14 00:31:22.732923 kernel: TERM=linux May 14 00:31:22.732929 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 14 00:31:22.732939 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 14 00:31:22.732948 systemd[1]: Detected virtualization kvm. May 14 00:31:22.732956 systemd[1]: Detected architecture arm64. May 14 00:31:22.732963 systemd[1]: Running in initrd. May 14 00:31:22.732970 systemd[1]: No hostname configured, using default hostname. May 14 00:31:22.732977 systemd[1]: Hostname set to . May 14 00:31:22.732985 systemd[1]: Initializing machine ID from VM UUID. May 14 00:31:22.732993 systemd[1]: Queued start job for default target initrd.target. May 14 00:31:22.733000 systemd[1]: Started systemd-ask-password-console.path. May 14 00:31:22.733008 systemd[1]: Reached target cryptsetup.target. May 14 00:31:22.733015 systemd[1]: Reached target paths.target. May 14 00:31:22.733022 systemd[1]: Reached target slices.target. May 14 00:31:22.733029 systemd[1]: Reached target swap.target. May 14 00:31:22.733036 systemd[1]: Reached target timers.target. May 14 00:31:22.733043 systemd[1]: Listening on iscsid.socket. May 14 00:31:22.733052 systemd[1]: Listening on iscsiuio.socket. May 14 00:31:22.733059 systemd[1]: Listening on systemd-journald-audit.socket. May 14 00:31:22.733066 systemd[1]: Listening on systemd-journald-dev-log.socket. May 14 00:31:22.733073 systemd[1]: Listening on systemd-journald.socket. May 14 00:31:22.733080 systemd[1]: Listening on systemd-networkd.socket. May 14 00:31:22.733088 systemd[1]: Listening on systemd-udevd-control.socket. May 14 00:31:22.733095 systemd[1]: Listening on systemd-udevd-kernel.socket. May 14 00:31:22.733102 systemd[1]: Reached target sockets.target. May 14 00:31:22.733111 systemd[1]: Starting kmod-static-nodes.service... May 14 00:31:22.733118 systemd[1]: Finished network-cleanup.service. May 14 00:31:22.733125 systemd[1]: Starting systemd-fsck-usr.service... May 14 00:31:22.733132 systemd[1]: Starting systemd-journald.service... May 14 00:31:22.733140 systemd[1]: Starting systemd-modules-load.service... May 14 00:31:22.733147 systemd[1]: Starting systemd-resolved.service... May 14 00:31:22.733154 systemd[1]: Starting systemd-vconsole-setup.service... May 14 00:31:22.733161 systemd[1]: Finished kmod-static-nodes.service. May 14 00:31:22.733169 systemd[1]: Finished systemd-fsck-usr.service. May 14 00:31:22.733178 kernel: audit: type=1130 audit(1747182682.726:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.733185 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 14 00:31:22.733195 systemd-journald[289]: Journal started May 14 00:31:22.733237 systemd-journald[289]: Runtime Journal (/run/log/journal/9f13127c1c4d4d9eb4edfb05cf200ba0) is 6.0M, max 48.7M, 42.6M free. May 14 00:31:22.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.727302 systemd-modules-load[290]: Inserted module 'overlay' May 14 00:31:22.738137 systemd[1]: Started systemd-journald.service. May 14 00:31:22.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.738565 systemd[1]: Finished systemd-vconsole-setup.service. May 14 00:31:22.744518 kernel: audit: type=1130 audit(1747182682.738:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.744536 kernel: audit: type=1130 audit(1747182682.740:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.744674 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 14 00:31:22.748785 kernel: audit: type=1130 audit(1747182682.744:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.749573 systemd[1]: Starting dracut-cmdline-ask.service... May 14 00:31:22.751709 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 14 00:31:22.754495 systemd-modules-load[290]: Inserted module 'br_netfilter' May 14 00:31:22.755350 kernel: Bridge firewalling registered May 14 00:31:22.763886 systemd-resolved[291]: Positive Trust Anchors: May 14 00:31:22.763897 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 14 00:31:22.763928 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 14 00:31:22.771105 kernel: SCSI subsystem initialized May 14 00:31:22.768126 systemd-resolved[291]: Defaulting to hostname 'linux'. May 14 00:31:22.778749 kernel: audit: type=1130 audit(1747182682.771:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.778770 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 14 00:31:22.778799 kernel: device-mapper: uevent: version 1.0.3 May 14 00:31:22.778809 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 14 00:31:22.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.768862 systemd[1]: Started systemd-resolved.service. May 14 00:31:22.774784 systemd[1]: Reached target nss-lookup.target. May 14 00:31:22.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.778999 systemd[1]: Finished dracut-cmdline-ask.service. May 14 00:31:22.783895 kernel: audit: type=1130 audit(1747182682.779:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.783375 systemd-modules-load[290]: Inserted module 'dm_multipath' May 14 00:31:22.783908 systemd[1]: Starting dracut-cmdline.service... May 14 00:31:22.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.784730 systemd[1]: Finished systemd-modules-load.service. May 14 00:31:22.790273 kernel: audit: type=1130 audit(1747182682.785:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.788924 systemd[1]: Starting systemd-sysctl.service... May 14 00:31:22.793852 dracut-cmdline[309]: dracut-dracut-053 May 14 00:31:22.795630 systemd[1]: Finished systemd-sysctl.service. May 14 00:31:22.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.799311 dracut-cmdline[309]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=412b3b42de04d7d5abb18ecf506be3ad2c72d6425f1b2391aa97d359e8bd9923 May 14 00:31:22.803223 kernel: audit: type=1130 audit(1747182682.795:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.852795 kernel: Loading iSCSI transport class v2.0-870. May 14 00:31:22.864804 kernel: iscsi: registered transport (tcp) May 14 00:31:22.880805 kernel: iscsi: registered transport (qla4xxx) May 14 00:31:22.880826 kernel: QLogic iSCSI HBA Driver May 14 00:31:22.915816 systemd[1]: Finished dracut-cmdline.service. May 14 00:31:22.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.917484 systemd[1]: Starting dracut-pre-udev.service... May 14 00:31:22.920804 kernel: audit: type=1130 audit(1747182682.915:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:22.964804 kernel: raid6: neonx8 gen() 13731 MB/s May 14 00:31:22.981792 kernel: raid6: neonx8 xor() 10763 MB/s May 14 00:31:22.998797 kernel: raid6: neonx4 gen() 13541 MB/s May 14 00:31:23.015797 kernel: raid6: neonx4 xor() 11208 MB/s May 14 00:31:23.032798 kernel: raid6: neonx2 gen() 12943 MB/s May 14 00:31:23.049802 kernel: raid6: neonx2 xor() 10355 MB/s May 14 00:31:23.066807 kernel: raid6: neonx1 gen() 10564 MB/s May 14 00:31:23.083796 kernel: raid6: neonx1 xor() 8770 MB/s May 14 00:31:23.100805 kernel: raid6: int64x8 gen() 6263 MB/s May 14 00:31:23.117798 kernel: raid6: int64x8 xor() 3541 MB/s May 14 00:31:23.134803 kernel: raid6: int64x4 gen() 7208 MB/s May 14 00:31:23.151798 kernel: raid6: int64x4 xor() 3848 MB/s May 14 00:31:23.168796 kernel: raid6: int64x2 gen() 6142 MB/s May 14 00:31:23.185796 kernel: raid6: int64x2 xor() 3318 MB/s May 14 00:31:23.202807 kernel: raid6: int64x1 gen() 5018 MB/s May 14 00:31:23.220044 kernel: raid6: int64x1 xor() 2643 MB/s May 14 00:31:23.220066 kernel: raid6: using algorithm neonx8 gen() 13731 MB/s May 14 00:31:23.220076 kernel: raid6: .... xor() 10763 MB/s, rmw enabled May 14 00:31:23.221227 kernel: raid6: using neon recovery algorithm May 14 00:31:23.233800 kernel: xor: measuring software checksum speed May 14 00:31:23.233814 kernel: 8regs : 17242 MB/sec May 14 00:31:23.235080 kernel: 32regs : 18211 MB/sec May 14 00:31:23.235091 kernel: arm64_neon : 27635 MB/sec May 14 00:31:23.235801 kernel: xor: using function: arm64_neon (27635 MB/sec) May 14 00:31:23.292800 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 14 00:31:23.303320 systemd[1]: Finished dracut-pre-udev.service. May 14 00:31:23.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:23.303000 audit: BPF prog-id=7 op=LOAD May 14 00:31:23.304000 audit: BPF prog-id=8 op=LOAD May 14 00:31:23.305368 systemd[1]: Starting systemd-udevd.service... May 14 00:31:23.322311 systemd-udevd[489]: Using default interface naming scheme 'v252'. May 14 00:31:23.325715 systemd[1]: Started systemd-udevd.service. May 14 00:31:23.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:23.328759 systemd[1]: Starting dracut-pre-trigger.service... May 14 00:31:23.340753 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation May 14 00:31:23.369475 systemd[1]: Finished dracut-pre-trigger.service. May 14 00:31:23.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:23.371113 systemd[1]: Starting systemd-udev-trigger.service... May 14 00:31:23.406078 systemd[1]: Finished systemd-udev-trigger.service. May 14 00:31:23.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:23.445452 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 14 00:31:23.450286 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 14 00:31:23.450301 kernel: GPT:9289727 != 19775487 May 14 00:31:23.450310 kernel: GPT:Alternate GPT header not at the end of the disk. May 14 00:31:23.450318 kernel: GPT:9289727 != 19775487 May 14 00:31:23.450327 kernel: GPT: Use GNU Parted to correct GPT errors. May 14 00:31:23.450335 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:31:23.460744 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 14 00:31:23.464381 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 14 00:31:23.465382 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 14 00:31:23.470799 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (550) May 14 00:31:23.474217 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 14 00:31:23.482440 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 14 00:31:23.484273 systemd[1]: Starting disk-uuid.service... May 14 00:31:23.490614 disk-uuid[560]: Primary Header is updated. May 14 00:31:23.490614 disk-uuid[560]: Secondary Entries is updated. May 14 00:31:23.490614 disk-uuid[560]: Secondary Header is updated. May 14 00:31:23.493952 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:31:24.514859 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:31:24.514917 disk-uuid[561]: The operation has completed successfully. May 14 00:31:24.537771 systemd[1]: disk-uuid.service: Deactivated successfully. May 14 00:31:24.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.537887 systemd[1]: Finished disk-uuid.service. May 14 00:31:24.541741 systemd[1]: Starting verity-setup.service... May 14 00:31:24.561798 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 14 00:31:24.580657 systemd[1]: Found device dev-mapper-usr.device. May 14 00:31:24.582926 systemd[1]: Mounting sysusr-usr.mount... May 14 00:31:24.584721 systemd[1]: Finished verity-setup.service. May 14 00:31:24.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.631487 systemd[1]: Mounted sysusr-usr.mount. May 14 00:31:24.632844 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 14 00:31:24.632382 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 14 00:31:24.633121 systemd[1]: Starting ignition-setup.service... May 14 00:31:24.635336 systemd[1]: Starting parse-ip-for-networkd.service... May 14 00:31:24.641851 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 14 00:31:24.641885 kernel: BTRFS info (device vda6): using free space tree May 14 00:31:24.641896 kernel: BTRFS info (device vda6): has skinny extents May 14 00:31:24.650167 systemd[1]: mnt-oem.mount: Deactivated successfully. May 14 00:31:24.656127 systemd[1]: Finished ignition-setup.service. May 14 00:31:24.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.657720 systemd[1]: Starting ignition-fetch-offline.service... May 14 00:31:24.723317 systemd[1]: Finished parse-ip-for-networkd.service. May 14 00:31:24.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.724000 audit: BPF prog-id=9 op=LOAD May 14 00:31:24.725586 systemd[1]: Starting systemd-networkd.service... May 14 00:31:24.747737 ignition[643]: Ignition 2.14.0 May 14 00:31:24.747747 ignition[643]: Stage: fetch-offline May 14 00:31:24.747799 ignition[643]: no configs at "/usr/lib/ignition/base.d" May 14 00:31:24.747808 ignition[643]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:31:24.747932 ignition[643]: parsed url from cmdline: "" May 14 00:31:24.747935 ignition[643]: no config URL provided May 14 00:31:24.747940 ignition[643]: reading system config file "/usr/lib/ignition/user.ign" May 14 00:31:24.747947 ignition[643]: no config at "/usr/lib/ignition/user.ign" May 14 00:31:24.747965 ignition[643]: op(1): [started] loading QEMU firmware config module May 14 00:31:24.754199 systemd-networkd[738]: lo: Link UP May 14 00:31:24.747970 ignition[643]: op(1): executing: "modprobe" "qemu_fw_cfg" May 14 00:31:24.754203 systemd-networkd[738]: lo: Gained carrier May 14 00:31:24.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.754599 systemd-networkd[738]: Enumeration completed May 14 00:31:24.754796 systemd-networkd[738]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 14 00:31:24.758843 ignition[643]: op(1): [finished] loading QEMU firmware config module May 14 00:31:24.754928 systemd[1]: Started systemd-networkd.service. May 14 00:31:24.755938 systemd-networkd[738]: eth0: Link UP May 14 00:31:24.755942 systemd-networkd[738]: eth0: Gained carrier May 14 00:31:24.757055 systemd[1]: Reached target network.target. May 14 00:31:24.759902 systemd[1]: Starting iscsiuio.service... May 14 00:31:24.769614 systemd[1]: Started iscsiuio.service. May 14 00:31:24.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.771358 systemd[1]: Starting iscsid.service... May 14 00:31:24.774827 iscsid[744]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 14 00:31:24.774827 iscsid[744]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 14 00:31:24.774827 iscsid[744]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 14 00:31:24.774827 iscsid[744]: If using hardware iscsi like qla4xxx this message can be ignored. May 14 00:31:24.774827 iscsid[744]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 14 00:31:24.774827 iscsid[744]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 14 00:31:24.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.774849 systemd-networkd[738]: eth0: DHCPv4 address 10.0.0.19/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 14 00:31:24.777740 systemd[1]: Started iscsid.service. May 14 00:31:24.784418 systemd[1]: Starting dracut-initqueue.service... May 14 00:31:24.794582 systemd[1]: Finished dracut-initqueue.service. May 14 00:31:24.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.795611 systemd[1]: Reached target remote-fs-pre.target. May 14 00:31:24.797171 systemd[1]: Reached target remote-cryptsetup.target. May 14 00:31:24.798808 systemd[1]: Reached target remote-fs.target. May 14 00:31:24.801226 systemd[1]: Starting dracut-pre-mount.service... May 14 00:31:24.808850 systemd[1]: Finished dracut-pre-mount.service. May 14 00:31:24.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.823606 ignition[643]: parsing config with SHA512: 099eabd7d968d3a5637e49b1edf5350c48ae94d807556209f52008f62b736f6e3cb681c8014184022fb5f262b2d9c784a8883290fc24fa68a9954e0b03cac2f8 May 14 00:31:24.830145 unknown[643]: fetched base config from "system" May 14 00:31:24.830155 unknown[643]: fetched user config from "qemu" May 14 00:31:24.830564 ignition[643]: fetch-offline: fetch-offline passed May 14 00:31:24.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.831733 systemd[1]: Finished ignition-fetch-offline.service. May 14 00:31:24.830622 ignition[643]: Ignition finished successfully May 14 00:31:24.832828 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 14 00:31:24.833565 systemd[1]: Starting ignition-kargs.service... May 14 00:31:24.842833 ignition[759]: Ignition 2.14.0 May 14 00:31:24.842843 ignition[759]: Stage: kargs May 14 00:31:24.842940 ignition[759]: no configs at "/usr/lib/ignition/base.d" May 14 00:31:24.845139 systemd[1]: Finished ignition-kargs.service. May 14 00:31:24.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.842950 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:31:24.843738 ignition[759]: kargs: kargs passed May 14 00:31:24.847499 systemd[1]: Starting ignition-disks.service... May 14 00:31:24.843795 ignition[759]: Ignition finished successfully May 14 00:31:24.854650 ignition[765]: Ignition 2.14.0 May 14 00:31:24.854661 ignition[765]: Stage: disks May 14 00:31:24.854768 ignition[765]: no configs at "/usr/lib/ignition/base.d" May 14 00:31:24.856818 systemd[1]: Finished ignition-disks.service. May 14 00:31:24.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.854817 ignition[765]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:31:24.858364 systemd[1]: Reached target initrd-root-device.target. May 14 00:31:24.855729 ignition[765]: disks: disks passed May 14 00:31:24.859669 systemd[1]: Reached target local-fs-pre.target. May 14 00:31:24.855771 ignition[765]: Ignition finished successfully May 14 00:31:24.861373 systemd[1]: Reached target local-fs.target. May 14 00:31:24.862720 systemd[1]: Reached target sysinit.target. May 14 00:31:24.863928 systemd[1]: Reached target basic.target. May 14 00:31:24.866099 systemd[1]: Starting systemd-fsck-root.service... May 14 00:31:24.876807 systemd-fsck[773]: ROOT: clean, 619/553520 files, 56022/553472 blocks May 14 00:31:24.879981 systemd[1]: Finished systemd-fsck-root.service. May 14 00:31:24.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.882055 systemd[1]: Mounting sysroot.mount... May 14 00:31:24.888793 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 14 00:31:24.889230 systemd[1]: Mounted sysroot.mount. May 14 00:31:24.890035 systemd[1]: Reached target initrd-root-fs.target. May 14 00:31:24.892264 systemd[1]: Mounting sysroot-usr.mount... May 14 00:31:24.893248 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 14 00:31:24.893285 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 14 00:31:24.893309 systemd[1]: Reached target ignition-diskful.target. May 14 00:31:24.895203 systemd[1]: Mounted sysroot-usr.mount. May 14 00:31:24.896937 systemd[1]: Starting initrd-setup-root.service... May 14 00:31:24.901472 initrd-setup-root[783]: cut: /sysroot/etc/passwd: No such file or directory May 14 00:31:24.905236 initrd-setup-root[791]: cut: /sysroot/etc/group: No such file or directory May 14 00:31:24.909492 initrd-setup-root[799]: cut: /sysroot/etc/shadow: No such file or directory May 14 00:31:24.913898 initrd-setup-root[807]: cut: /sysroot/etc/gshadow: No such file or directory May 14 00:31:24.941079 systemd[1]: Finished initrd-setup-root.service. May 14 00:31:24.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.943104 systemd[1]: Starting ignition-mount.service... May 14 00:31:24.944859 systemd[1]: Starting sysroot-boot.service... May 14 00:31:24.950222 bash[824]: umount: /sysroot/usr/share/oem: not mounted. May 14 00:31:24.959200 ignition[826]: INFO : Ignition 2.14.0 May 14 00:31:24.960169 ignition[826]: INFO : Stage: mount May 14 00:31:24.960978 ignition[826]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:31:24.960978 ignition[826]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:31:24.963087 ignition[826]: INFO : mount: mount passed May 14 00:31:24.963087 ignition[826]: INFO : Ignition finished successfully May 14 00:31:24.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:24.963255 systemd[1]: Finished ignition-mount.service. May 14 00:31:24.968679 systemd[1]: Finished sysroot-boot.service. May 14 00:31:24.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:25.593371 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 14 00:31:25.600799 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (835) May 14 00:31:25.604400 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 14 00:31:25.604416 kernel: BTRFS info (device vda6): using free space tree May 14 00:31:25.604426 kernel: BTRFS info (device vda6): has skinny extents May 14 00:31:25.607999 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 14 00:31:25.609537 systemd[1]: Starting ignition-files.service... May 14 00:31:25.623105 ignition[855]: INFO : Ignition 2.14.0 May 14 00:31:25.623105 ignition[855]: INFO : Stage: files May 14 00:31:25.624753 ignition[855]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:31:25.624753 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:31:25.624753 ignition[855]: DEBUG : files: compiled without relabeling support, skipping May 14 00:31:25.628208 ignition[855]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 14 00:31:25.628208 ignition[855]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 14 00:31:25.628208 ignition[855]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 14 00:31:25.632250 ignition[855]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 14 00:31:25.632250 ignition[855]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 14 00:31:25.632250 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 14 00:31:25.632250 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 May 14 00:31:25.628865 unknown[855]: wrote ssh authorized keys file for user: core May 14 00:31:25.751873 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 14 00:31:25.900992 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 14 00:31:25.902998 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 May 14 00:31:26.114919 systemd-networkd[738]: eth0: Gained IPv6LL May 14 00:31:26.338761 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 14 00:31:27.012899 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 14 00:31:27.015480 ignition[855]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 14 00:31:27.015480 ignition[855]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 14 00:31:27.015480 ignition[855]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 14 00:31:27.015480 ignition[855]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 14 00:31:27.015480 ignition[855]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 14 00:31:27.015480 ignition[855]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 14 00:31:27.015480 ignition[855]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 14 00:31:27.015480 ignition[855]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 14 00:31:27.015480 ignition[855]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 14 00:31:27.015480 ignition[855]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 14 00:31:27.015480 ignition[855]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 14 00:31:27.015480 ignition[855]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 14 00:31:27.056043 ignition[855]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 14 00:31:27.057735 ignition[855]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 14 00:31:27.057735 ignition[855]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 14 00:31:27.057735 ignition[855]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 14 00:31:27.057735 ignition[855]: INFO : files: files passed May 14 00:31:27.057735 ignition[855]: INFO : Ignition finished successfully May 14 00:31:27.070755 kernel: kauditd_printk_skb: 24 callbacks suppressed May 14 00:31:27.070793 kernel: audit: type=1130 audit(1747182687.062:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.061378 systemd[1]: Finished ignition-files.service. May 14 00:31:27.063114 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 14 00:31:27.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.068177 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 14 00:31:27.083795 kernel: audit: type=1130 audit(1747182687.071:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.083820 kernel: audit: type=1131 audit(1747182687.071:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.083830 kernel: audit: type=1130 audit(1747182687.079:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.083880 initrd-setup-root-after-ignition[880]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 14 00:31:27.068915 systemd[1]: Starting ignition-quench.service... May 14 00:31:27.087524 initrd-setup-root-after-ignition[882]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 14 00:31:27.071691 systemd[1]: ignition-quench.service: Deactivated successfully. May 14 00:31:27.071834 systemd[1]: Finished ignition-quench.service. May 14 00:31:27.074763 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 14 00:31:27.079571 systemd[1]: Reached target ignition-complete.target. May 14 00:31:27.085412 systemd[1]: Starting initrd-parse-etc.service... May 14 00:31:27.097707 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 14 00:31:27.097825 systemd[1]: Finished initrd-parse-etc.service. May 14 00:31:27.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.099670 systemd[1]: Reached target initrd-fs.target. May 14 00:31:27.106598 kernel: audit: type=1130 audit(1747182687.099:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.106621 kernel: audit: type=1131 audit(1747182687.099:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.105958 systemd[1]: Reached target initrd.target. May 14 00:31:27.107345 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 14 00:31:27.108168 systemd[1]: Starting dracut-pre-pivot.service... May 14 00:31:27.118244 systemd[1]: Finished dracut-pre-pivot.service. May 14 00:31:27.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.119897 systemd[1]: Starting initrd-cleanup.service... May 14 00:31:27.123688 kernel: audit: type=1130 audit(1747182687.119:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.128200 systemd[1]: Stopped target nss-lookup.target. May 14 00:31:27.129185 systemd[1]: Stopped target remote-cryptsetup.target. May 14 00:31:27.130735 systemd[1]: Stopped target timers.target. May 14 00:31:27.132215 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 14 00:31:27.136808 kernel: audit: type=1131 audit(1747182687.132:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.132333 systemd[1]: Stopped dracut-pre-pivot.service. May 14 00:31:27.133712 systemd[1]: Stopped target initrd.target. May 14 00:31:27.137635 systemd[1]: Stopped target basic.target. May 14 00:31:27.139013 systemd[1]: Stopped target ignition-complete.target. May 14 00:31:27.140448 systemd[1]: Stopped target ignition-diskful.target. May 14 00:31:27.141883 systemd[1]: Stopped target initrd-root-device.target. May 14 00:31:27.143503 systemd[1]: Stopped target remote-fs.target. May 14 00:31:27.144929 systemd[1]: Stopped target remote-fs-pre.target. May 14 00:31:27.146421 systemd[1]: Stopped target sysinit.target. May 14 00:31:27.147671 systemd[1]: Stopped target local-fs.target. May 14 00:31:27.149022 systemd[1]: Stopped target local-fs-pre.target. May 14 00:31:27.150410 systemd[1]: Stopped target swap.target. May 14 00:31:27.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.151705 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 14 00:31:27.157715 kernel: audit: type=1131 audit(1747182687.153:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.151870 systemd[1]: Stopped dracut-pre-mount.service. May 14 00:31:27.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.153272 systemd[1]: Stopped target cryptsetup.target. May 14 00:31:27.162735 kernel: audit: type=1131 audit(1747182687.158:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.156939 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 14 00:31:27.157046 systemd[1]: Stopped dracut-initqueue.service. May 14 00:31:27.158587 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 14 00:31:27.158688 systemd[1]: Stopped ignition-fetch-offline.service. May 14 00:31:27.162253 systemd[1]: Stopped target paths.target. May 14 00:31:27.163460 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 14 00:31:27.166805 systemd[1]: Stopped systemd-ask-password-console.path. May 14 00:31:27.167761 systemd[1]: Stopped target slices.target. May 14 00:31:27.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.169040 systemd[1]: Stopped target sockets.target. May 14 00:31:27.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.170630 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 14 00:31:27.170744 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 14 00:31:27.176840 iscsid[744]: iscsid shutting down. May 14 00:31:27.172326 systemd[1]: ignition-files.service: Deactivated successfully. May 14 00:31:27.172436 systemd[1]: Stopped ignition-files.service. May 14 00:31:27.174520 systemd[1]: Stopping ignition-mount.service... May 14 00:31:27.182151 ignition[895]: INFO : Ignition 2.14.0 May 14 00:31:27.182151 ignition[895]: INFO : Stage: umount May 14 00:31:27.182151 ignition[895]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:31:27.182151 ignition[895]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:31:27.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.176178 systemd[1]: Stopping iscsid.service... May 14 00:31:27.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.188324 ignition[895]: INFO : umount: umount passed May 14 00:31:27.188324 ignition[895]: INFO : Ignition finished successfully May 14 00:31:27.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.177315 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 14 00:31:27.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.177443 systemd[1]: Stopped kmod-static-nodes.service. May 14 00:31:27.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.179411 systemd[1]: Stopping sysroot-boot.service... May 14 00:31:27.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.181449 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 14 00:31:27.181605 systemd[1]: Stopped systemd-udev-trigger.service. May 14 00:31:27.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.182981 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 14 00:31:27.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.183092 systemd[1]: Stopped dracut-pre-trigger.service. May 14 00:31:27.185842 systemd[1]: iscsid.service: Deactivated successfully. May 14 00:31:27.185936 systemd[1]: Stopped iscsid.service. May 14 00:31:27.188101 systemd[1]: ignition-mount.service: Deactivated successfully. May 14 00:31:27.188173 systemd[1]: Stopped ignition-mount.service. May 14 00:31:27.190022 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 14 00:31:27.190574 systemd[1]: iscsid.socket: Deactivated successfully. May 14 00:31:27.190626 systemd[1]: Closed iscsid.socket. May 14 00:31:27.191465 systemd[1]: ignition-disks.service: Deactivated successfully. May 14 00:31:27.191509 systemd[1]: Stopped ignition-disks.service. May 14 00:31:27.192996 systemd[1]: ignition-kargs.service: Deactivated successfully. May 14 00:31:27.193041 systemd[1]: Stopped ignition-kargs.service. May 14 00:31:27.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.195162 systemd[1]: ignition-setup.service: Deactivated successfully. May 14 00:31:27.195212 systemd[1]: Stopped ignition-setup.service. May 14 00:31:27.199467 systemd[1]: Stopping iscsiuio.service... May 14 00:31:27.200881 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 14 00:31:27.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.200984 systemd[1]: Finished initrd-cleanup.service. May 14 00:31:27.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.202574 systemd[1]: iscsiuio.service: Deactivated successfully. May 14 00:31:27.202669 systemd[1]: Stopped iscsiuio.service. May 14 00:31:27.205088 systemd[1]: Stopped target network.target. May 14 00:31:27.206733 systemd[1]: iscsiuio.socket: Deactivated successfully. May 14 00:31:27.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.206771 systemd[1]: Closed iscsiuio.socket. May 14 00:31:27.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.208299 systemd[1]: Stopping systemd-networkd.service... May 14 00:31:27.210378 systemd[1]: Stopping systemd-resolved.service... May 14 00:31:27.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.216394 systemd-networkd[738]: eth0: DHCPv6 lease lost May 14 00:31:27.237000 audit: BPF prog-id=9 op=UNLOAD May 14 00:31:27.238000 audit: BPF prog-id=6 op=UNLOAD May 14 00:31:27.217519 systemd[1]: systemd-networkd.service: Deactivated successfully. May 14 00:31:27.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.217613 systemd[1]: Stopped systemd-networkd.service. May 14 00:31:27.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.219323 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 14 00:31:27.219351 systemd[1]: Closed systemd-networkd.socket. May 14 00:31:27.222253 systemd[1]: Stopping network-cleanup.service... May 14 00:31:27.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.223027 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 14 00:31:27.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.223089 systemd[1]: Stopped parse-ip-for-networkd.service. May 14 00:31:27.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.224490 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 14 00:31:27.224535 systemd[1]: Stopped systemd-sysctl.service. May 14 00:31:27.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.226617 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 14 00:31:27.226656 systemd[1]: Stopped systemd-modules-load.service. May 14 00:31:27.227573 systemd[1]: Stopping systemd-udevd.service... May 14 00:31:27.232123 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 14 00:31:27.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.232596 systemd[1]: systemd-resolved.service: Deactivated successfully. May 14 00:31:27.232676 systemd[1]: Stopped systemd-resolved.service. May 14 00:31:27.234459 systemd[1]: sysroot-boot.service: Deactivated successfully. May 14 00:31:27.234546 systemd[1]: Stopped sysroot-boot.service. May 14 00:31:27.236233 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 14 00:31:27.236286 systemd[1]: Stopped initrd-setup-root.service. May 14 00:31:27.238467 systemd[1]: network-cleanup.service: Deactivated successfully. May 14 00:31:27.238557 systemd[1]: Stopped network-cleanup.service. May 14 00:31:27.240203 systemd[1]: systemd-udevd.service: Deactivated successfully. May 14 00:31:27.240315 systemd[1]: Stopped systemd-udevd.service. May 14 00:31:27.241847 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 14 00:31:27.241879 systemd[1]: Closed systemd-udevd-control.socket. May 14 00:31:27.243076 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 14 00:31:27.243109 systemd[1]: Closed systemd-udevd-kernel.socket. May 14 00:31:27.244555 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 14 00:31:27.244600 systemd[1]: Stopped dracut-pre-udev.service. May 14 00:31:27.246071 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 14 00:31:27.246113 systemd[1]: Stopped dracut-cmdline.service. May 14 00:31:27.247438 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 14 00:31:27.247477 systemd[1]: Stopped dracut-cmdline-ask.service. May 14 00:31:27.249857 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 14 00:31:27.250652 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 14 00:31:27.250706 systemd[1]: Stopped systemd-vconsole-setup.service. May 14 00:31:27.255001 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 14 00:31:27.255082 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 14 00:31:27.256589 systemd[1]: Reached target initrd-switch-root.target. May 14 00:31:27.259098 systemd[1]: Starting initrd-switch-root.service... May 14 00:31:27.265213 systemd[1]: Switching root. May 14 00:31:27.285488 systemd-journald[289]: Journal stopped May 14 00:31:29.311145 systemd-journald[289]: Received SIGTERM from PID 1 (n/a). May 14 00:31:29.311200 kernel: SELinux: Class mctp_socket not defined in policy. May 14 00:31:29.311213 kernel: SELinux: Class anon_inode not defined in policy. May 14 00:31:29.311223 kernel: SELinux: the above unknown classes and permissions will be allowed May 14 00:31:29.311236 kernel: SELinux: policy capability network_peer_controls=1 May 14 00:31:29.311248 kernel: SELinux: policy capability open_perms=1 May 14 00:31:29.311257 kernel: SELinux: policy capability extended_socket_class=1 May 14 00:31:29.311267 kernel: SELinux: policy capability always_check_network=0 May 14 00:31:29.311276 kernel: SELinux: policy capability cgroup_seclabel=1 May 14 00:31:29.311285 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 14 00:31:29.311296 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 14 00:31:29.311305 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 14 00:31:29.311317 systemd[1]: Successfully loaded SELinux policy in 35.329ms. May 14 00:31:29.311334 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.357ms. May 14 00:31:29.311355 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 14 00:31:29.311368 systemd[1]: Detected virtualization kvm. May 14 00:31:29.311378 systemd[1]: Detected architecture arm64. May 14 00:31:29.311388 systemd[1]: Detected first boot. May 14 00:31:29.311398 systemd[1]: Initializing machine ID from VM UUID. May 14 00:31:29.311410 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 14 00:31:29.311420 systemd[1]: Populated /etc with preset unit settings. May 14 00:31:29.311431 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:31:29.311443 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:31:29.311455 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:31:29.311466 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 14 00:31:29.311478 systemd[1]: Stopped initrd-switch-root.service. May 14 00:31:29.311490 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 14 00:31:29.311501 systemd[1]: Created slice system-addon\x2dconfig.slice. May 14 00:31:29.311511 systemd[1]: Created slice system-addon\x2drun.slice. May 14 00:31:29.311521 systemd[1]: Created slice system-getty.slice. May 14 00:31:29.311532 systemd[1]: Created slice system-modprobe.slice. May 14 00:31:29.311547 systemd[1]: Created slice system-serial\x2dgetty.slice. May 14 00:31:29.311558 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 14 00:31:29.311568 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 14 00:31:29.311578 systemd[1]: Created slice user.slice. May 14 00:31:29.311588 systemd[1]: Started systemd-ask-password-console.path. May 14 00:31:29.311599 systemd[1]: Started systemd-ask-password-wall.path. May 14 00:31:29.311609 systemd[1]: Set up automount boot.automount. May 14 00:31:29.311619 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 14 00:31:29.311630 systemd[1]: Stopped target initrd-switch-root.target. May 14 00:31:29.311641 systemd[1]: Stopped target initrd-fs.target. May 14 00:31:29.311652 systemd[1]: Stopped target initrd-root-fs.target. May 14 00:31:29.311662 systemd[1]: Reached target integritysetup.target. May 14 00:31:29.311677 systemd[1]: Reached target remote-cryptsetup.target. May 14 00:31:29.311687 systemd[1]: Reached target remote-fs.target. May 14 00:31:29.311697 systemd[1]: Reached target slices.target. May 14 00:31:29.311708 systemd[1]: Reached target swap.target. May 14 00:31:29.311719 systemd[1]: Reached target torcx.target. May 14 00:31:29.311731 systemd[1]: Reached target veritysetup.target. May 14 00:31:29.311741 systemd[1]: Listening on systemd-coredump.socket. May 14 00:31:29.311751 systemd[1]: Listening on systemd-initctl.socket. May 14 00:31:29.311762 systemd[1]: Listening on systemd-networkd.socket. May 14 00:31:29.311773 systemd[1]: Listening on systemd-udevd-control.socket. May 14 00:31:29.311805 systemd[1]: Listening on systemd-udevd-kernel.socket. May 14 00:31:29.311815 systemd[1]: Listening on systemd-userdbd.socket. May 14 00:31:29.311825 systemd[1]: Mounting dev-hugepages.mount... May 14 00:31:29.311836 systemd[1]: Mounting dev-mqueue.mount... May 14 00:31:29.311846 systemd[1]: Mounting media.mount... May 14 00:31:29.311857 systemd[1]: Mounting sys-kernel-debug.mount... May 14 00:31:29.311868 systemd[1]: Mounting sys-kernel-tracing.mount... May 14 00:31:29.311878 systemd[1]: Mounting tmp.mount... May 14 00:31:29.311888 systemd[1]: Starting flatcar-tmpfiles.service... May 14 00:31:29.311898 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:31:29.311908 systemd[1]: Starting kmod-static-nodes.service... May 14 00:31:29.311918 systemd[1]: Starting modprobe@configfs.service... May 14 00:31:29.311929 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:31:29.311939 systemd[1]: Starting modprobe@drm.service... May 14 00:31:29.311950 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:31:29.311961 systemd[1]: Starting modprobe@fuse.service... May 14 00:31:29.311972 systemd[1]: Starting modprobe@loop.service... May 14 00:31:29.311983 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 14 00:31:29.311993 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 14 00:31:29.312004 systemd[1]: Stopped systemd-fsck-root.service. May 14 00:31:29.312015 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 14 00:31:29.312025 kernel: fuse: init (API version 7.34) May 14 00:31:29.312035 systemd[1]: Stopped systemd-fsck-usr.service. May 14 00:31:29.312046 systemd[1]: Stopped systemd-journald.service. May 14 00:31:29.312056 kernel: loop: module loaded May 14 00:31:29.312066 systemd[1]: Starting systemd-journald.service... May 14 00:31:29.312076 systemd[1]: Starting systemd-modules-load.service... May 14 00:31:29.312087 systemd[1]: Starting systemd-network-generator.service... May 14 00:31:29.312097 systemd[1]: Starting systemd-remount-fs.service... May 14 00:31:29.312107 systemd[1]: Starting systemd-udev-trigger.service... May 14 00:31:29.312118 systemd[1]: verity-setup.service: Deactivated successfully. May 14 00:31:29.312128 systemd[1]: Stopped verity-setup.service. May 14 00:31:29.312139 systemd[1]: Mounted dev-hugepages.mount. May 14 00:31:29.312150 systemd[1]: Mounted dev-mqueue.mount. May 14 00:31:29.312160 systemd[1]: Mounted media.mount. May 14 00:31:29.312170 systemd[1]: Mounted sys-kernel-debug.mount. May 14 00:31:29.312180 systemd[1]: Mounted sys-kernel-tracing.mount. May 14 00:31:29.312191 systemd[1]: Mounted tmp.mount. May 14 00:31:29.312202 systemd[1]: Finished kmod-static-nodes.service. May 14 00:31:29.312212 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 14 00:31:29.312223 systemd[1]: Finished modprobe@configfs.service. May 14 00:31:29.312235 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:31:29.312245 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:31:29.312258 systemd-journald[991]: Journal started May 14 00:31:29.312300 systemd-journald[991]: Runtime Journal (/run/log/journal/9f13127c1c4d4d9eb4edfb05cf200ba0) is 6.0M, max 48.7M, 42.6M free. May 14 00:31:27.365000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 14 00:31:27.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 14 00:31:27.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 14 00:31:27.449000 audit: BPF prog-id=10 op=LOAD May 14 00:31:27.449000 audit: BPF prog-id=10 op=UNLOAD May 14 00:31:27.449000 audit: BPF prog-id=11 op=LOAD May 14 00:31:27.449000 audit: BPF prog-id=11 op=UNLOAD May 14 00:31:27.499000 audit[928]: AVC avc: denied { associate } for pid=928 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 14 00:31:27.499000 audit[928]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58a2 a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=911 pid=928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:27.499000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 14 00:31:27.501000 audit[928]: AVC avc: denied { associate } for pid=928 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 14 00:31:27.501000 audit[928]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5979 a2=1ed a3=0 items=2 ppid=911 pid=928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:27.501000 audit: CWD cwd="/" May 14 00:31:27.501000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:31:27.501000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:31:27.501000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 14 00:31:29.176000 audit: BPF prog-id=12 op=LOAD May 14 00:31:29.176000 audit: BPF prog-id=3 op=UNLOAD May 14 00:31:29.176000 audit: BPF prog-id=13 op=LOAD May 14 00:31:29.177000 audit: BPF prog-id=14 op=LOAD May 14 00:31:29.177000 audit: BPF prog-id=4 op=UNLOAD May 14 00:31:29.177000 audit: BPF prog-id=5 op=UNLOAD May 14 00:31:29.177000 audit: BPF prog-id=15 op=LOAD May 14 00:31:29.177000 audit: BPF prog-id=12 op=UNLOAD May 14 00:31:29.177000 audit: BPF prog-id=16 op=LOAD May 14 00:31:29.177000 audit: BPF prog-id=17 op=LOAD May 14 00:31:29.177000 audit: BPF prog-id=13 op=UNLOAD May 14 00:31:29.177000 audit: BPF prog-id=14 op=UNLOAD May 14 00:31:29.178000 audit: BPF prog-id=18 op=LOAD May 14 00:31:29.178000 audit: BPF prog-id=15 op=UNLOAD May 14 00:31:29.178000 audit: BPF prog-id=19 op=LOAD May 14 00:31:29.178000 audit: BPF prog-id=20 op=LOAD May 14 00:31:29.178000 audit: BPF prog-id=16 op=UNLOAD May 14 00:31:29.178000 audit: BPF prog-id=17 op=UNLOAD May 14 00:31:29.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.193000 audit: BPF prog-id=18 op=UNLOAD May 14 00:31:29.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.277000 audit: BPF prog-id=21 op=LOAD May 14 00:31:29.277000 audit: BPF prog-id=22 op=LOAD May 14 00:31:29.277000 audit: BPF prog-id=23 op=LOAD May 14 00:31:29.277000 audit: BPF prog-id=19 op=UNLOAD May 14 00:31:29.277000 audit: BPF prog-id=20 op=UNLOAD May 14 00:31:29.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.309000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 14 00:31:29.309000 audit[991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=fffffe95d5d0 a2=4000 a3=1 items=0 ppid=1 pid=991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:29.309000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 14 00:31:29.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.498758 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:31:29.175811 systemd[1]: Queued start job for default target multi-user.target. May 14 00:31:27.499066 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 14 00:31:29.175823 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 14 00:31:27.499087 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 14 00:31:29.179218 systemd[1]: systemd-journald.service: Deactivated successfully. May 14 00:31:27.499118 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 14 00:31:27.499128 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=debug msg="skipped missing lower profile" missing profile=oem May 14 00:31:27.499157 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 14 00:31:27.499169 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 14 00:31:27.499380 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 14 00:31:27.499417 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 14 00:31:27.499429 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 14 00:31:27.499941 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 14 00:31:27.499978 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 14 00:31:27.499997 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 14 00:31:27.500011 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 14 00:31:29.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:27.500028 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 14 00:31:29.314831 systemd[1]: Started systemd-journald.service. May 14 00:31:27.500040 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 14 00:31:28.918334 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:28Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:31:28.918597 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:28Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:31:28.918705 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:28Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:31:28.918897 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:28Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:31:28.918961 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:28Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 14 00:31:29.315142 systemd[1]: modprobe@drm.service: Deactivated successfully. May 14 00:31:28.919016 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-05-14T00:31:28Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 14 00:31:29.315293 systemd[1]: Finished modprobe@drm.service. May 14 00:31:29.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.316431 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:31:29.316586 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:31:29.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.317848 systemd[1]: Finished flatcar-tmpfiles.service. May 14 00:31:29.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.318886 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 14 00:31:29.319038 systemd[1]: Finished modprobe@fuse.service. May 14 00:31:29.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.320127 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:31:29.320275 systemd[1]: Finished modprobe@loop.service. May 14 00:31:29.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.321383 systemd[1]: Finished systemd-modules-load.service. May 14 00:31:29.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.322600 systemd[1]: Finished systemd-network-generator.service. May 14 00:31:29.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.323817 systemd[1]: Finished systemd-remount-fs.service. May 14 00:31:29.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.325156 systemd[1]: Reached target network-pre.target. May 14 00:31:29.327180 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 14 00:31:29.329149 systemd[1]: Mounting sys-kernel-config.mount... May 14 00:31:29.329882 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 14 00:31:29.331673 systemd[1]: Starting systemd-hwdb-update.service... May 14 00:31:29.333662 systemd[1]: Starting systemd-journal-flush.service... May 14 00:31:29.334668 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:31:29.335757 systemd[1]: Starting systemd-random-seed.service... May 14 00:31:29.336655 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:31:29.337920 systemd[1]: Starting systemd-sysctl.service... May 14 00:31:29.339991 systemd[1]: Starting systemd-sysusers.service... May 14 00:31:29.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.342899 systemd[1]: Finished systemd-udev-trigger.service. May 14 00:31:29.344007 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 14 00:31:29.344977 systemd[1]: Mounted sys-kernel-config.mount. May 14 00:31:29.346889 systemd-journald[991]: Time spent on flushing to /var/log/journal/9f13127c1c4d4d9eb4edfb05cf200ba0 is 13.464ms for 1005 entries. May 14 00:31:29.346889 systemd-journald[991]: System Journal (/var/log/journal/9f13127c1c4d4d9eb4edfb05cf200ba0) is 8.0M, max 195.6M, 187.6M free. May 14 00:31:29.372720 systemd-journald[991]: Received client request to flush runtime journal. May 14 00:31:29.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.348341 systemd[1]: Starting systemd-udev-settle.service... May 14 00:31:29.373129 udevadm[1028]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 14 00:31:29.350647 systemd[1]: Finished systemd-random-seed.service. May 14 00:31:29.351750 systemd[1]: Reached target first-boot-complete.target. May 14 00:31:29.361160 systemd[1]: Finished systemd-sysusers.service. May 14 00:31:29.363490 systemd[1]: Finished systemd-sysctl.service. May 14 00:31:29.373633 systemd[1]: Finished systemd-journal-flush.service. May 14 00:31:29.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.698973 systemd[1]: Finished systemd-hwdb-update.service. May 14 00:31:29.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.699000 audit: BPF prog-id=24 op=LOAD May 14 00:31:29.699000 audit: BPF prog-id=25 op=LOAD May 14 00:31:29.699000 audit: BPF prog-id=7 op=UNLOAD May 14 00:31:29.699000 audit: BPF prog-id=8 op=UNLOAD May 14 00:31:29.701293 systemd[1]: Starting systemd-udevd.service... May 14 00:31:29.718712 systemd-udevd[1031]: Using default interface naming scheme 'v252'. May 14 00:31:29.729662 systemd[1]: Started systemd-udevd.service. May 14 00:31:29.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.730000 audit: BPF prog-id=26 op=LOAD May 14 00:31:29.736419 systemd[1]: Starting systemd-networkd.service... May 14 00:31:29.750491 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 14 00:31:29.762000 audit: BPF prog-id=27 op=LOAD May 14 00:31:29.762000 audit: BPF prog-id=28 op=LOAD May 14 00:31:29.762000 audit: BPF prog-id=29 op=LOAD May 14 00:31:29.763818 systemd[1]: Starting systemd-userdbd.service... May 14 00:31:29.800061 systemd[1]: Started systemd-userdbd.service. May 14 00:31:29.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.805900 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 14 00:31:29.814191 systemd[1]: Finished systemd-udev-settle.service. May 14 00:31:29.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.816239 systemd[1]: Starting lvm2-activation-early.service... May 14 00:31:29.827915 lvm[1063]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 14 00:31:29.840128 systemd-networkd[1040]: lo: Link UP May 14 00:31:29.840139 systemd-networkd[1040]: lo: Gained carrier May 14 00:31:29.840477 systemd-networkd[1040]: Enumeration completed May 14 00:31:29.840588 systemd-networkd[1040]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 14 00:31:29.840597 systemd[1]: Started systemd-networkd.service. May 14 00:31:29.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.842304 systemd-networkd[1040]: eth0: Link UP May 14 00:31:29.842315 systemd-networkd[1040]: eth0: Gained carrier May 14 00:31:29.856691 systemd[1]: Finished lvm2-activation-early.service. May 14 00:31:29.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.857713 systemd[1]: Reached target cryptsetup.target. May 14 00:31:29.859634 systemd[1]: Starting lvm2-activation.service... May 14 00:31:29.863060 lvm[1065]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 14 00:31:29.864903 systemd-networkd[1040]: eth0: DHCPv4 address 10.0.0.19/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 14 00:31:29.890595 systemd[1]: Finished lvm2-activation.service. May 14 00:31:29.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.891545 systemd[1]: Reached target local-fs-pre.target. May 14 00:31:29.892432 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 14 00:31:29.892467 systemd[1]: Reached target local-fs.target. May 14 00:31:29.893257 systemd[1]: Reached target machines.target. May 14 00:31:29.895178 systemd[1]: Starting ldconfig.service... May 14 00:31:29.896223 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:31:29.896303 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:31:29.897716 systemd[1]: Starting systemd-boot-update.service... May 14 00:31:29.899864 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 14 00:31:29.902606 systemd[1]: Starting systemd-machine-id-commit.service... May 14 00:31:29.905935 systemd[1]: Starting systemd-sysext.service... May 14 00:31:29.908961 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1067 (bootctl) May 14 00:31:29.910213 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 14 00:31:29.912468 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 14 00:31:29.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.920600 systemd[1]: Unmounting usr-share-oem.mount... May 14 00:31:29.925042 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 14 00:31:29.925219 systemd[1]: Unmounted usr-share-oem.mount. May 14 00:31:29.936821 kernel: loop0: detected capacity change from 0 to 194096 May 14 00:31:29.972987 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 14 00:31:29.974149 systemd[1]: Finished systemd-machine-id-commit.service. May 14 00:31:29.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.978798 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 14 00:31:29.986431 systemd-fsck[1077]: fsck.fat 4.2 (2021-01-31) May 14 00:31:29.986431 systemd-fsck[1077]: /dev/vda1: 236 files, 117310/258078 clusters May 14 00:31:29.989291 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 14 00:31:29.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:29.992867 kernel: loop1: detected capacity change from 0 to 194096 May 14 00:31:29.994208 systemd[1]: Mounting boot.mount... May 14 00:31:29.998046 (sd-sysext)[1082]: Using extensions 'kubernetes'. May 14 00:31:29.998384 (sd-sysext)[1082]: Merged extensions into '/usr'. May 14 00:31:30.018678 systemd[1]: Mounted boot.mount. May 14 00:31:30.028869 systemd[1]: Finished systemd-boot-update.service. May 14 00:31:30.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.030829 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:31:30.033729 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:31:30.037047 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:31:30.040008 systemd[1]: Starting modprobe@loop.service... May 14 00:31:30.040998 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:31:30.041149 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:31:30.042558 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:31:30.042715 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:31:30.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.044091 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:31:30.044210 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:31:30.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.045595 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:31:30.045752 systemd[1]: Finished modprobe@loop.service. May 14 00:31:30.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.047172 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:31:30.047289 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:31:30.079823 ldconfig[1066]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 14 00:31:30.083673 systemd[1]: Finished ldconfig.service. May 14 00:31:30.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.297120 systemd[1]: Mounting usr-share-oem.mount... May 14 00:31:30.302069 systemd[1]: Mounted usr-share-oem.mount. May 14 00:31:30.303891 systemd[1]: Finished systemd-sysext.service. May 14 00:31:30.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.305848 systemd[1]: Starting ensure-sysext.service... May 14 00:31:30.307541 systemd[1]: Starting systemd-tmpfiles-setup.service... May 14 00:31:30.312000 systemd[1]: Reloading. May 14 00:31:30.318499 systemd-tmpfiles[1090]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 14 00:31:30.320209 systemd-tmpfiles[1090]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 14 00:31:30.322893 systemd-tmpfiles[1090]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 14 00:31:30.350956 /usr/lib/systemd/system-generators/torcx-generator[1110]: time="2025-05-14T00:31:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:31:30.351701 /usr/lib/systemd/system-generators/torcx-generator[1110]: time="2025-05-14T00:31:30Z" level=info msg="torcx already run" May 14 00:31:30.408267 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:31:30.408287 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:31:30.425938 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:31:30.473000 audit: BPF prog-id=30 op=LOAD May 14 00:31:30.473000 audit: BPF prog-id=26 op=UNLOAD May 14 00:31:30.475000 audit: BPF prog-id=31 op=LOAD May 14 00:31:30.475000 audit: BPF prog-id=21 op=UNLOAD May 14 00:31:30.475000 audit: BPF prog-id=32 op=LOAD May 14 00:31:30.475000 audit: BPF prog-id=33 op=LOAD May 14 00:31:30.475000 audit: BPF prog-id=22 op=UNLOAD May 14 00:31:30.475000 audit: BPF prog-id=23 op=UNLOAD May 14 00:31:30.476000 audit: BPF prog-id=34 op=LOAD May 14 00:31:30.476000 audit: BPF prog-id=35 op=LOAD May 14 00:31:30.476000 audit: BPF prog-id=24 op=UNLOAD May 14 00:31:30.476000 audit: BPF prog-id=25 op=UNLOAD May 14 00:31:30.476000 audit: BPF prog-id=36 op=LOAD May 14 00:31:30.476000 audit: BPF prog-id=27 op=UNLOAD May 14 00:31:30.477000 audit: BPF prog-id=37 op=LOAD May 14 00:31:30.477000 audit: BPF prog-id=38 op=LOAD May 14 00:31:30.477000 audit: BPF prog-id=28 op=UNLOAD May 14 00:31:30.477000 audit: BPF prog-id=29 op=UNLOAD May 14 00:31:30.480269 systemd[1]: Finished systemd-tmpfiles-setup.service. May 14 00:31:30.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.484491 systemd[1]: Starting audit-rules.service... May 14 00:31:30.486406 systemd[1]: Starting clean-ca-certificates.service... May 14 00:31:30.488641 systemd[1]: Starting systemd-journal-catalog-update.service... May 14 00:31:30.489000 audit: BPF prog-id=39 op=LOAD May 14 00:31:30.494358 systemd[1]: Starting systemd-resolved.service... May 14 00:31:30.495000 audit: BPF prog-id=40 op=LOAD May 14 00:31:30.496971 systemd[1]: Starting systemd-timesyncd.service... May 14 00:31:30.498925 systemd[1]: Starting systemd-update-utmp.service... May 14 00:31:30.506000 audit[1160]: SYSTEM_BOOT pid=1160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 14 00:31:30.504193 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:31:30.505430 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:31:30.508348 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:31:30.510396 systemd[1]: Starting modprobe@loop.service... May 14 00:31:30.511270 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:31:30.511411 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:31:30.512427 systemd[1]: Finished clean-ca-certificates.service. May 14 00:31:30.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.513760 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:31:30.513888 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:31:30.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.515194 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:31:30.515307 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:31:30.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.516715 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:31:30.516940 systemd[1]: Finished modprobe@loop.service. May 14 00:31:30.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.521065 systemd[1]: Finished systemd-journal-catalog-update.service. May 14 00:31:30.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.522563 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:31:30.523773 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:31:30.525806 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:31:30.527856 systemd[1]: Starting modprobe@loop.service... May 14 00:31:30.528673 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:31:30.528888 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:31:30.530200 systemd[1]: Starting systemd-update-done.service... May 14 00:31:30.531177 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:31:30.532387 systemd[1]: Finished systemd-update-utmp.service. May 14 00:31:30.533762 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:31:30.533894 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:31:30.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.535156 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:31:30.535266 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:31:30.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.536615 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:31:30.536728 systemd[1]: Finished modprobe@loop.service. May 14 00:31:30.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.538869 systemd[1]: Finished systemd-update-done.service. May 14 00:31:30.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:30.542707 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:31:30.543900 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:31:30.545848 systemd[1]: Starting modprobe@drm.service... May 14 00:31:30.547930 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:31:30.552146 systemd[1]: Starting modprobe@loop.service... May 14 00:31:30.552000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 14 00:31:30.552000 audit[1179]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff1e26df0 a2=420 a3=0 items=0 ppid=1149 pid=1179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:30.552000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 14 00:31:30.552991 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:31:30.553153 augenrules[1179]: No rules May 14 00:31:30.553121 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:31:30.554417 systemd[1]: Starting systemd-networkd-wait-online.service... May 14 00:31:30.555515 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:31:30.556789 systemd[1]: Finished audit-rules.service. May 14 00:31:30.558042 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:31:30.558164 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:31:30.559397 systemd[1]: Started systemd-timesyncd.service. May 14 00:31:30.560512 systemd-timesyncd[1159]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 14 00:31:30.560607 systemd-timesyncd[1159]: Initial clock synchronization to Wed 2025-05-14 00:31:30.367820 UTC. May 14 00:31:30.561175 systemd[1]: modprobe@drm.service: Deactivated successfully. May 14 00:31:30.561299 systemd[1]: Finished modprobe@drm.service. May 14 00:31:30.562601 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:31:30.562720 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:31:30.563990 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:31:30.564103 systemd[1]: Finished modprobe@loop.service. May 14 00:31:30.565607 systemd[1]: Reached target time-set.target. May 14 00:31:30.566470 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:31:30.566509 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:31:30.566828 systemd[1]: Finished ensure-sysext.service. May 14 00:31:30.568840 systemd-resolved[1153]: Positive Trust Anchors: May 14 00:31:30.569076 systemd-resolved[1153]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 14 00:31:30.569168 systemd-resolved[1153]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 14 00:31:30.580018 systemd-resolved[1153]: Defaulting to hostname 'linux'. May 14 00:31:30.586903 systemd[1]: Started systemd-resolved.service. May 14 00:31:30.587799 systemd[1]: Reached target network.target. May 14 00:31:30.588622 systemd[1]: Reached target nss-lookup.target. May 14 00:31:30.589500 systemd[1]: Reached target sysinit.target. May 14 00:31:30.590471 systemd[1]: Started motdgen.path. May 14 00:31:30.591265 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 14 00:31:30.592532 systemd[1]: Started logrotate.timer. May 14 00:31:30.593438 systemd[1]: Started mdadm.timer. May 14 00:31:30.594162 systemd[1]: Started systemd-tmpfiles-clean.timer. May 14 00:31:30.595030 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 14 00:31:30.595067 systemd[1]: Reached target paths.target. May 14 00:31:30.595861 systemd[1]: Reached target timers.target. May 14 00:31:30.596994 systemd[1]: Listening on dbus.socket. May 14 00:31:30.598847 systemd[1]: Starting docker.socket... May 14 00:31:30.602199 systemd[1]: Listening on sshd.socket. May 14 00:31:30.603093 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:31:30.603610 systemd[1]: Listening on docker.socket. May 14 00:31:30.604495 systemd[1]: Reached target sockets.target. May 14 00:31:30.605308 systemd[1]: Reached target basic.target. May 14 00:31:30.606165 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 14 00:31:30.606207 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 14 00:31:30.607316 systemd[1]: Starting containerd.service... May 14 00:31:30.609128 systemd[1]: Starting dbus.service... May 14 00:31:30.611117 systemd[1]: Starting enable-oem-cloudinit.service... May 14 00:31:30.613286 systemd[1]: Starting extend-filesystems.service... May 14 00:31:30.614288 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 14 00:31:30.615460 systemd[1]: Starting motdgen.service... May 14 00:31:30.618058 systemd[1]: Starting prepare-helm.service... May 14 00:31:30.620914 systemd[1]: Starting ssh-key-proc-cmdline.service... May 14 00:31:30.622629 jq[1191]: false May 14 00:31:30.623397 systemd[1]: Starting sshd-keygen.service... May 14 00:31:30.626671 systemd[1]: Starting systemd-logind.service... May 14 00:31:30.627628 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:31:30.627754 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 14 00:31:30.628348 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 14 00:31:30.629244 systemd[1]: Starting update-engine.service... May 14 00:31:30.632833 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 14 00:31:30.638876 jq[1209]: true May 14 00:31:30.636770 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 14 00:31:30.636395 dbus-daemon[1190]: [system] SELinux support is enabled May 14 00:31:30.636974 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 14 00:31:30.637150 systemd[1]: Started dbus.service. May 14 00:31:30.640488 extend-filesystems[1192]: Found loop1 May 14 00:31:30.641443 extend-filesystems[1192]: Found vda May 14 00:31:30.641443 extend-filesystems[1192]: Found vda1 May 14 00:31:30.641443 extend-filesystems[1192]: Found vda2 May 14 00:31:30.641443 extend-filesystems[1192]: Found vda3 May 14 00:31:30.641443 extend-filesystems[1192]: Found usr May 14 00:31:30.641443 extend-filesystems[1192]: Found vda4 May 14 00:31:30.641443 extend-filesystems[1192]: Found vda6 May 14 00:31:30.641443 extend-filesystems[1192]: Found vda7 May 14 00:31:30.641443 extend-filesystems[1192]: Found vda9 May 14 00:31:30.641443 extend-filesystems[1192]: Checking size of /dev/vda9 May 14 00:31:30.641261 systemd[1]: motdgen.service: Deactivated successfully. May 14 00:31:30.641457 systemd[1]: Finished motdgen.service. May 14 00:31:30.643483 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 14 00:31:30.643651 systemd[1]: Finished ssh-key-proc-cmdline.service. May 14 00:31:30.646961 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 14 00:31:30.646995 systemd[1]: Reached target system-config.target. May 14 00:31:30.648084 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 14 00:31:30.648098 systemd[1]: Reached target user-config.target. May 14 00:31:30.653197 jq[1214]: true May 14 00:31:30.658666 tar[1212]: linux-arm64/helm May 14 00:31:30.680671 extend-filesystems[1192]: Resized partition /dev/vda9 May 14 00:31:30.686908 extend-filesystems[1235]: resize2fs 1.46.5 (30-Dec-2021) May 14 00:31:30.694807 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 14 00:31:30.723928 update_engine[1206]: I0514 00:31:30.723657 1206 main.cc:92] Flatcar Update Engine starting May 14 00:31:30.726804 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 14 00:31:30.728386 systemd[1]: Started update-engine.service. May 14 00:31:30.746309 extend-filesystems[1235]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 14 00:31:30.746309 extend-filesystems[1235]: old_desc_blocks = 1, new_desc_blocks = 1 May 14 00:31:30.746309 extend-filesystems[1235]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 14 00:31:30.756429 update_engine[1206]: I0514 00:31:30.728380 1206 update_check_scheduler.cc:74] Next update check in 3m13s May 14 00:31:30.731082 systemd[1]: Started locksmithd.service. May 14 00:31:30.756541 extend-filesystems[1192]: Resized filesystem in /dev/vda9 May 14 00:31:30.757517 bash[1236]: Updated "/home/core/.ssh/authorized_keys" May 14 00:31:30.746751 systemd[1]: extend-filesystems.service: Deactivated successfully. May 14 00:31:30.746943 systemd[1]: Finished extend-filesystems.service. May 14 00:31:30.748032 systemd-logind[1202]: Watching system buttons on /dev/input/event0 (Power Button) May 14 00:31:30.750232 systemd-logind[1202]: New seat seat0. May 14 00:31:30.751364 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 14 00:31:30.758263 systemd[1]: Started systemd-logind.service. May 14 00:31:30.769819 env[1215]: time="2025-05-14T00:31:30.768561880Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 14 00:31:30.807634 env[1215]: time="2025-05-14T00:31:30.807528520Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 14 00:31:30.807733 env[1215]: time="2025-05-14T00:31:30.807704560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 14 00:31:30.809120 env[1215]: time="2025-05-14T00:31:30.809078480Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 14 00:31:30.809224 env[1215]: time="2025-05-14T00:31:30.809207560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 14 00:31:30.809524 env[1215]: time="2025-05-14T00:31:30.809497080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 14 00:31:30.809619 env[1215]: time="2025-05-14T00:31:30.809603120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 14 00:31:30.809679 env[1215]: time="2025-05-14T00:31:30.809664760Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 14 00:31:30.809739 env[1215]: time="2025-05-14T00:31:30.809725360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 14 00:31:30.809900 env[1215]: time="2025-05-14T00:31:30.809880280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 14 00:31:30.810206 env[1215]: time="2025-05-14T00:31:30.810182000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 14 00:31:30.810431 env[1215]: time="2025-05-14T00:31:30.810405120Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 14 00:31:30.810501 env[1215]: time="2025-05-14T00:31:30.810487280Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 14 00:31:30.810615 env[1215]: time="2025-05-14T00:31:30.810595720Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 14 00:31:30.810690 env[1215]: time="2025-05-14T00:31:30.810675800Z" level=info msg="metadata content store policy set" policy=shared May 14 00:31:30.815827 env[1215]: time="2025-05-14T00:31:30.815797520Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 14 00:31:30.815937 env[1215]: time="2025-05-14T00:31:30.815922640Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 14 00:31:30.816016 env[1215]: time="2025-05-14T00:31:30.816001160Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 14 00:31:30.816104 env[1215]: time="2025-05-14T00:31:30.816087640Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 14 00:31:30.816164 env[1215]: time="2025-05-14T00:31:30.816149760Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 14 00:31:30.816221 env[1215]: time="2025-05-14T00:31:30.816208000Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 14 00:31:30.816278 env[1215]: time="2025-05-14T00:31:30.816264960Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 14 00:31:30.816683 env[1215]: time="2025-05-14T00:31:30.816655000Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 14 00:31:30.816766 env[1215]: time="2025-05-14T00:31:30.816750920Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 14 00:31:30.816890 env[1215]: time="2025-05-14T00:31:30.816873200Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 14 00:31:30.816951 env[1215]: time="2025-05-14T00:31:30.816938320Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 14 00:31:30.817014 env[1215]: time="2025-05-14T00:31:30.817001640Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 14 00:31:30.817231 env[1215]: time="2025-05-14T00:31:30.817213600Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 14 00:31:30.817425 env[1215]: time="2025-05-14T00:31:30.817408040Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 14 00:31:30.817830 env[1215]: time="2025-05-14T00:31:30.817792880Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 14 00:31:30.817893 env[1215]: time="2025-05-14T00:31:30.817846840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 14 00:31:30.817893 env[1215]: time="2025-05-14T00:31:30.817862800Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 14 00:31:30.818060 env[1215]: time="2025-05-14T00:31:30.818046040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818102 env[1215]: time="2025-05-14T00:31:30.818066480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818102 env[1215]: time="2025-05-14T00:31:30.818081640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818102 env[1215]: time="2025-05-14T00:31:30.818094280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818162 env[1215]: time="2025-05-14T00:31:30.818106360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818162 env[1215]: time="2025-05-14T00:31:30.818118720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818162 env[1215]: time="2025-05-14T00:31:30.818129840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818162 env[1215]: time="2025-05-14T00:31:30.818141800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818162 env[1215]: time="2025-05-14T00:31:30.818156400Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 14 00:31:30.818313 env[1215]: time="2025-05-14T00:31:30.818294400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818354 env[1215]: time="2025-05-14T00:31:30.818317080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818354 env[1215]: time="2025-05-14T00:31:30.818331280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818354 env[1215]: time="2025-05-14T00:31:30.818351600Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 14 00:31:30.818418 env[1215]: time="2025-05-14T00:31:30.818365920Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 14 00:31:30.818418 env[1215]: time="2025-05-14T00:31:30.818379840Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 14 00:31:30.818418 env[1215]: time="2025-05-14T00:31:30.818396840Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 14 00:31:30.818482 env[1215]: time="2025-05-14T00:31:30.818430160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 14 00:31:30.818671 env[1215]: time="2025-05-14T00:31:30.818622640Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 14 00:31:30.819610 env[1215]: time="2025-05-14T00:31:30.818682800Z" level=info msg="Connect containerd service" May 14 00:31:30.819610 env[1215]: time="2025-05-14T00:31:30.818717800Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 14 00:31:30.819610 env[1215]: time="2025-05-14T00:31:30.819482760Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 14 00:31:30.819947 env[1215]: time="2025-05-14T00:31:30.819926640Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 14 00:31:30.819979 env[1215]: time="2025-05-14T00:31:30.819912840Z" level=info msg="Start subscribing containerd event" May 14 00:31:30.820001 env[1215]: time="2025-05-14T00:31:30.819977440Z" level=info msg=serving... address=/run/containerd/containerd.sock May 14 00:31:30.821217 env[1215]: time="2025-05-14T00:31:30.819998160Z" level=info msg="Start recovering state" May 14 00:31:30.821217 env[1215]: time="2025-05-14T00:31:30.820022240Z" level=info msg="containerd successfully booted in 0.057199s" May 14 00:31:30.821217 env[1215]: time="2025-05-14T00:31:30.821054320Z" level=info msg="Start event monitor" May 14 00:31:30.821217 env[1215]: time="2025-05-14T00:31:30.821091720Z" level=info msg="Start snapshots syncer" May 14 00:31:30.821217 env[1215]: time="2025-05-14T00:31:30.821103640Z" level=info msg="Start cni network conf syncer for default" May 14 00:31:30.821217 env[1215]: time="2025-05-14T00:31:30.821115920Z" level=info msg="Start streaming server" May 14 00:31:30.820105 systemd[1]: Started containerd.service. May 14 00:31:30.836972 locksmithd[1242]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 14 00:31:31.047791 tar[1212]: linux-arm64/LICENSE May 14 00:31:31.048007 tar[1212]: linux-arm64/README.md May 14 00:31:31.052243 systemd[1]: Finished prepare-helm.service. May 14 00:31:31.746922 systemd-networkd[1040]: eth0: Gained IPv6LL May 14 00:31:31.748587 systemd[1]: Finished systemd-networkd-wait-online.service. May 14 00:31:31.749845 systemd[1]: Reached target network-online.target. May 14 00:31:31.752158 systemd[1]: Starting kubelet.service... May 14 00:31:32.295928 systemd[1]: Started kubelet.service. May 14 00:31:32.796054 kubelet[1257]: E0514 00:31:32.795952 1257 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 14 00:31:32.798326 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 14 00:31:32.798443 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 14 00:31:32.868679 sshd_keygen[1210]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 14 00:31:32.887224 systemd[1]: Finished sshd-keygen.service. May 14 00:31:32.889399 systemd[1]: Starting issuegen.service... May 14 00:31:32.893681 systemd[1]: issuegen.service: Deactivated successfully. May 14 00:31:32.893833 systemd[1]: Finished issuegen.service. May 14 00:31:32.895821 systemd[1]: Starting systemd-user-sessions.service... May 14 00:31:32.901543 systemd[1]: Finished systemd-user-sessions.service. May 14 00:31:32.903702 systemd[1]: Started getty@tty1.service. May 14 00:31:32.905797 systemd[1]: Started serial-getty@ttyAMA0.service. May 14 00:31:32.906832 systemd[1]: Reached target getty.target. May 14 00:31:32.907651 systemd[1]: Reached target multi-user.target. May 14 00:31:32.909677 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 14 00:31:32.915832 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 14 00:31:32.915975 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 14 00:31:32.917011 systemd[1]: Startup finished in 585ms (kernel) + 4.744s (initrd) + 5.599s (userspace) = 10.929s. May 14 00:31:34.917917 systemd[1]: Created slice system-sshd.slice. May 14 00:31:34.919053 systemd[1]: Started sshd@0-10.0.0.19:22-10.0.0.1:49782.service. May 14 00:31:34.970812 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 49782 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:31:34.973158 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:31:34.983912 systemd-logind[1202]: New session 1 of user core. May 14 00:31:34.984837 systemd[1]: Created slice user-500.slice. May 14 00:31:34.985970 systemd[1]: Starting user-runtime-dir@500.service... May 14 00:31:34.994240 systemd[1]: Finished user-runtime-dir@500.service. May 14 00:31:34.995530 systemd[1]: Starting user@500.service... May 14 00:31:34.998283 (systemd)[1283]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 14 00:31:35.057704 systemd[1283]: Queued start job for default target default.target. May 14 00:31:35.058192 systemd[1283]: Reached target paths.target. May 14 00:31:35.058224 systemd[1283]: Reached target sockets.target. May 14 00:31:35.058235 systemd[1283]: Reached target timers.target. May 14 00:31:35.058245 systemd[1283]: Reached target basic.target. May 14 00:31:35.058282 systemd[1283]: Reached target default.target. May 14 00:31:35.058305 systemd[1283]: Startup finished in 52ms. May 14 00:31:35.058490 systemd[1]: Started user@500.service. May 14 00:31:35.060279 systemd[1]: Started session-1.scope. May 14 00:31:35.113184 systemd[1]: Started sshd@1-10.0.0.19:22-10.0.0.1:49788.service. May 14 00:31:35.155117 sshd[1292]: Accepted publickey for core from 10.0.0.1 port 49788 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:31:35.156254 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:31:35.159644 systemd-logind[1202]: New session 2 of user core. May 14 00:31:35.160864 systemd[1]: Started session-2.scope. May 14 00:31:35.212557 sshd[1292]: pam_unix(sshd:session): session closed for user core May 14 00:31:35.216363 systemd[1]: Started sshd@2-10.0.0.19:22-10.0.0.1:49792.service. May 14 00:31:35.217705 systemd-logind[1202]: Session 2 logged out. Waiting for processes to exit. May 14 00:31:35.217899 systemd[1]: sshd@1-10.0.0.19:22-10.0.0.1:49788.service: Deactivated successfully. May 14 00:31:35.218528 systemd[1]: session-2.scope: Deactivated successfully. May 14 00:31:35.219112 systemd-logind[1202]: Removed session 2. May 14 00:31:35.257607 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 49792 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:31:35.259062 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:31:35.262213 systemd-logind[1202]: New session 3 of user core. May 14 00:31:35.263031 systemd[1]: Started session-3.scope. May 14 00:31:35.311054 sshd[1297]: pam_unix(sshd:session): session closed for user core May 14 00:31:35.313699 systemd[1]: sshd@2-10.0.0.19:22-10.0.0.1:49792.service: Deactivated successfully. May 14 00:31:35.314282 systemd[1]: session-3.scope: Deactivated successfully. May 14 00:31:35.314841 systemd-logind[1202]: Session 3 logged out. Waiting for processes to exit. May 14 00:31:35.315816 systemd[1]: Started sshd@3-10.0.0.19:22-10.0.0.1:49808.service. May 14 00:31:35.316509 systemd-logind[1202]: Removed session 3. May 14 00:31:35.357227 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 49808 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:31:35.358330 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:31:35.361482 systemd-logind[1202]: New session 4 of user core. May 14 00:31:35.362305 systemd[1]: Started session-4.scope. May 14 00:31:35.415140 sshd[1304]: pam_unix(sshd:session): session closed for user core May 14 00:31:35.418661 systemd[1]: Started sshd@4-10.0.0.19:22-10.0.0.1:49812.service. May 14 00:31:35.419205 systemd[1]: sshd@3-10.0.0.19:22-10.0.0.1:49808.service: Deactivated successfully. May 14 00:31:35.419822 systemd[1]: session-4.scope: Deactivated successfully. May 14 00:31:35.420353 systemd-logind[1202]: Session 4 logged out. Waiting for processes to exit. May 14 00:31:35.421109 systemd-logind[1202]: Removed session 4. May 14 00:31:35.460820 sshd[1309]: Accepted publickey for core from 10.0.0.1 port 49812 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:31:35.462098 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:31:35.465055 systemd-logind[1202]: New session 5 of user core. May 14 00:31:35.465858 systemd[1]: Started session-5.scope. May 14 00:31:35.524474 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 14 00:31:35.524696 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:31:35.534984 dbus-daemon[1190]: avc: received setenforce notice (enforcing=1) May 14 00:31:35.536727 sudo[1313]: pam_unix(sudo:session): session closed for user root May 14 00:31:35.538511 sshd[1309]: pam_unix(sshd:session): session closed for user core May 14 00:31:35.542615 systemd[1]: sshd@4-10.0.0.19:22-10.0.0.1:49812.service: Deactivated successfully. May 14 00:31:35.543229 systemd[1]: session-5.scope: Deactivated successfully. May 14 00:31:35.543783 systemd-logind[1202]: Session 5 logged out. Waiting for processes to exit. May 14 00:31:35.544916 systemd[1]: Started sshd@5-10.0.0.19:22-10.0.0.1:49826.service. May 14 00:31:35.545560 systemd-logind[1202]: Removed session 5. May 14 00:31:35.586181 sshd[1317]: Accepted publickey for core from 10.0.0.1 port 49826 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:31:35.587486 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:31:35.590462 systemd-logind[1202]: New session 6 of user core. May 14 00:31:35.591273 systemd[1]: Started session-6.scope. May 14 00:31:35.642010 sudo[1321]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 14 00:31:35.642225 sudo[1321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:31:35.644488 sudo[1321]: pam_unix(sudo:session): session closed for user root May 14 00:31:35.648408 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 14 00:31:35.648616 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:31:35.656608 systemd[1]: Stopping audit-rules.service... May 14 00:31:35.657000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 14 00:31:35.658142 auditctl[1324]: No rules May 14 00:31:35.658539 systemd[1]: audit-rules.service: Deactivated successfully. May 14 00:31:35.658689 systemd[1]: Stopped audit-rules.service. May 14 00:31:35.660069 systemd[1]: Starting audit-rules.service... May 14 00:31:35.660226 kernel: kauditd_printk_skb: 173 callbacks suppressed May 14 00:31:35.660259 kernel: audit: type=1305 audit(1747182695.657:207): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 14 00:31:35.660275 kernel: audit: type=1300 audit(1747182695.657:207): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff5b1f570 a2=420 a3=0 items=0 ppid=1 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:35.657000 audit[1324]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff5b1f570 a2=420 a3=0 items=0 ppid=1 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:35.663714 kernel: audit: type=1327 audit(1747182695.657:207): proctitle=2F7362696E2F617564697463746C002D44 May 14 00:31:35.657000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 14 00:31:35.664781 kernel: audit: type=1131 audit(1747182695.657:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:35.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:35.675073 augenrules[1341]: No rules May 14 00:31:35.675832 systemd[1]: Finished audit-rules.service. May 14 00:31:35.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:35.676582 sudo[1320]: pam_unix(sudo:session): session closed for user root May 14 00:31:35.674000 audit[1320]: USER_END pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:31:35.681887 kernel: audit: type=1130 audit(1747182695.674:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:35.681940 kernel: audit: type=1106 audit(1747182695.674:210): pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:31:35.682251 sshd[1317]: pam_unix(sshd:session): session closed for user core May 14 00:31:35.674000 audit[1320]: CRED_DISP pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:31:35.682863 systemd[1]: Started sshd@6-10.0.0.19:22-10.0.0.1:49840.service. May 14 00:31:35.685189 kernel: audit: type=1104 audit(1747182695.674:211): pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:31:35.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:49840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:35.687891 kernel: audit: type=1130 audit(1747182695.680:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:49840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:35.687000 audit[1317]: USER_END pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:31:35.689612 systemd[1]: sshd@5-10.0.0.19:22-10.0.0.1:49826.service: Deactivated successfully. May 14 00:31:35.690251 systemd[1]: session-6.scope: Deactivated successfully. May 14 00:31:35.690766 systemd-logind[1202]: Session 6 logged out. Waiting for processes to exit. May 14 00:31:35.691450 systemd-logind[1202]: Removed session 6. May 14 00:31:35.691790 kernel: audit: type=1106 audit(1747182695.687:213): pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:31:35.687000 audit[1317]: CRED_DISP pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:31:35.694652 kernel: audit: type=1104 audit(1747182695.687:214): pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:31:35.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.19:22-10.0.0.1:49826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:35.726000 audit[1346]: USER_ACCT pid=1346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:31:35.727009 sshd[1346]: Accepted publickey for core from 10.0.0.1 port 49840 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:31:35.726000 audit[1346]: CRED_ACQ pid=1346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:31:35.726000 audit[1346]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe955df10 a2=3 a3=1 items=0 ppid=1 pid=1346 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:35.726000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:31:35.727976 sshd[1346]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:31:35.731707 systemd-logind[1202]: New session 7 of user core. May 14 00:31:35.732125 systemd[1]: Started session-7.scope. May 14 00:31:35.735000 audit[1346]: USER_START pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:31:35.736000 audit[1349]: CRED_ACQ pid=1349 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:31:35.782000 audit[1350]: USER_ACCT pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:31:35.782000 audit[1350]: CRED_REFR pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:31:35.783341 sudo[1350]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 14 00:31:35.783545 sudo[1350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:31:35.785000 audit[1350]: USER_START pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:31:35.843047 systemd[1]: Starting docker.service... May 14 00:31:35.958188 env[1362]: time="2025-05-14T00:31:35.958131742Z" level=info msg="Starting up" May 14 00:31:35.960129 env[1362]: time="2025-05-14T00:31:35.960105532Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 14 00:31:35.960227 env[1362]: time="2025-05-14T00:31:35.960213033Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 14 00:31:35.960294 env[1362]: time="2025-05-14T00:31:35.960279640Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 14 00:31:35.960346 env[1362]: time="2025-05-14T00:31:35.960333509Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 14 00:31:35.962764 env[1362]: time="2025-05-14T00:31:35.962737737Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 14 00:31:35.962864 env[1362]: time="2025-05-14T00:31:35.962848985Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 14 00:31:35.963100 env[1362]: time="2025-05-14T00:31:35.963080511Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 14 00:31:35.963176 env[1362]: time="2025-05-14T00:31:35.963162064Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 14 00:31:36.078887 env[1362]: time="2025-05-14T00:31:36.078797270Z" level=info msg="Loading containers: start." May 14 00:31:36.126000 audit[1396]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.126000 audit[1396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffffd1e4360 a2=0 a3=1 items=0 ppid=1362 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.126000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 14 00:31:36.127000 audit[1398]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.127000 audit[1398]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffde8b9220 a2=0 a3=1 items=0 ppid=1362 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.127000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 14 00:31:36.129000 audit[1400]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.129000 audit[1400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffeec2c30 a2=0 a3=1 items=0 ppid=1362 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.129000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 14 00:31:36.131000 audit[1402]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.131000 audit[1402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff0b5b990 a2=0 a3=1 items=0 ppid=1362 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.131000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 14 00:31:36.134000 audit[1404]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.134000 audit[1404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffde7bf4b0 a2=0 a3=1 items=0 ppid=1362 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 14 00:31:36.159000 audit[1409]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.159000 audit[1409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe74efde0 a2=0 a3=1 items=0 ppid=1362 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.159000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 14 00:31:36.166000 audit[1411]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.166000 audit[1411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc9d055d0 a2=0 a3=1 items=0 ppid=1362 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.166000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 14 00:31:36.167000 audit[1413]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.167000 audit[1413]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffcdc61660 a2=0 a3=1 items=0 ppid=1362 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.167000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 14 00:31:36.169000 audit[1415]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.169000 audit[1415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffe6ce2d40 a2=0 a3=1 items=0 ppid=1362 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.169000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 14 00:31:36.175000 audit[1419]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.175000 audit[1419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffffa025c30 a2=0 a3=1 items=0 ppid=1362 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.175000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 14 00:31:36.184000 audit[1420]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.184000 audit[1420]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd9c4a1c0 a2=0 a3=1 items=0 ppid=1362 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.184000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 14 00:31:36.193786 kernel: Initializing XFRM netlink socket May 14 00:31:36.215125 env[1362]: time="2025-05-14T00:31:36.215085329Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 14 00:31:36.228000 audit[1428]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.228000 audit[1428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc04bf780 a2=0 a3=1 items=0 ppid=1362 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.228000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 14 00:31:36.242000 audit[1431]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.242000 audit[1431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe9d96750 a2=0 a3=1 items=0 ppid=1362 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.242000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 14 00:31:36.244000 audit[1434]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.244000 audit[1434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd5f385d0 a2=0 a3=1 items=0 ppid=1362 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.244000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 14 00:31:36.246000 audit[1436]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.246000 audit[1436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe25c4c60 a2=0 a3=1 items=0 ppid=1362 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.246000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 14 00:31:36.248000 audit[1438]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.248000 audit[1438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffcd332d60 a2=0 a3=1 items=0 ppid=1362 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.248000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 14 00:31:36.250000 audit[1440]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.250000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffffdf84db0 a2=0 a3=1 items=0 ppid=1362 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.250000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 14 00:31:36.252000 audit[1442]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.252000 audit[1442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffdc811290 a2=0 a3=1 items=0 ppid=1362 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.252000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 14 00:31:36.258000 audit[1445]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.258000 audit[1445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff3f9d0e0 a2=0 a3=1 items=0 ppid=1362 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.258000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 14 00:31:36.260000 audit[1447]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.260000 audit[1447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffefc9eaa0 a2=0 a3=1 items=0 ppid=1362 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.260000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 14 00:31:36.261000 audit[1449]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.261000 audit[1449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffedeaf930 a2=0 a3=1 items=0 ppid=1362 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.261000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 14 00:31:36.263000 audit[1451]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.263000 audit[1451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc5f17220 a2=0 a3=1 items=0 ppid=1362 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.263000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 14 00:31:36.264527 systemd-networkd[1040]: docker0: Link UP May 14 00:31:36.269000 audit[1455]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.269000 audit[1455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff0eb66d0 a2=0 a3=1 items=0 ppid=1362 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.269000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 14 00:31:36.280000 audit[1456]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:36.280000 audit[1456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff2794e50 a2=0 a3=1 items=0 ppid=1362 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:36.280000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 14 00:31:36.283031 env[1362]: time="2025-05-14T00:31:36.282984736Z" level=info msg="Loading containers: done." May 14 00:31:36.302155 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2516411877-merged.mount: Deactivated successfully. May 14 00:31:36.308483 env[1362]: time="2025-05-14T00:31:36.308439044Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 14 00:31:36.308658 env[1362]: time="2025-05-14T00:31:36.308612081Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 14 00:31:36.308721 env[1362]: time="2025-05-14T00:31:36.308700456Z" level=info msg="Daemon has completed initialization" May 14 00:31:36.323799 systemd[1]: Started docker.service. May 14 00:31:36.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:36.331083 env[1362]: time="2025-05-14T00:31:36.331002609Z" level=info msg="API listen on /run/docker.sock" May 14 00:31:37.274524 env[1215]: time="2025-05-14T00:31:37.274472494Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 14 00:31:37.971878 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4056721164.mount: Deactivated successfully. May 14 00:31:39.731887 env[1215]: time="2025-05-14T00:31:39.731828626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:39.734258 env[1215]: time="2025-05-14T00:31:39.734196953Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afbe230ec4abc2c9e87f7fbe7814bde21dbe30f03252c8861c4ca9510cb43ec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:39.735666 env[1215]: time="2025-05-14T00:31:39.735634404Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:39.738175 env[1215]: time="2025-05-14T00:31:39.738146135Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:39.738911 env[1215]: time="2025-05-14T00:31:39.738881561Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:afbe230ec4abc2c9e87f7fbe7814bde21dbe30f03252c8861c4ca9510cb43ec6\"" May 14 00:31:39.748890 env[1215]: time="2025-05-14T00:31:39.748862555Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 14 00:31:42.030602 env[1215]: time="2025-05-14T00:31:42.030548925Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:42.031935 env[1215]: time="2025-05-14T00:31:42.031900156Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3df23260c56ff58d759f8a841c67846184e97ce81a269549ca8d14b36da14c14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:42.033574 env[1215]: time="2025-05-14T00:31:42.033547855Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:42.035286 env[1215]: time="2025-05-14T00:31:42.035257568Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:42.036110 env[1215]: time="2025-05-14T00:31:42.036081457Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:3df23260c56ff58d759f8a841c67846184e97ce81a269549ca8d14b36da14c14\"" May 14 00:31:42.044998 env[1215]: time="2025-05-14T00:31:42.044963446Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 14 00:31:43.049165 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 14 00:31:43.055215 kernel: kauditd_printk_skb: 84 callbacks suppressed May 14 00:31:43.055262 kernel: audit: type=1130 audit(1747182703.048:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:43.055285 kernel: audit: type=1131 audit(1747182703.048:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:43.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:43.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:43.049343 systemd[1]: Stopped kubelet.service. May 14 00:31:43.050742 systemd[1]: Starting kubelet.service... May 14 00:31:43.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:43.135151 systemd[1]: Started kubelet.service. May 14 00:31:43.140787 kernel: audit: type=1130 audit(1747182703.134:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:43.177063 kubelet[1518]: E0514 00:31:43.177010 1518 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 14 00:31:43.179465 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 14 00:31:43.179589 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 14 00:31:43.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:31:43.182805 kernel: audit: type=1131 audit(1747182703.178:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:31:43.414177 env[1215]: time="2025-05-14T00:31:43.414060630Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:43.416021 env[1215]: time="2025-05-14T00:31:43.415970643Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fb0f5dac5fa74463b801d11598454c00462609b582d17052195012e5f682c2ba,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:43.417697 env[1215]: time="2025-05-14T00:31:43.417667377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:43.419572 env[1215]: time="2025-05-14T00:31:43.419543277Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:43.421276 env[1215]: time="2025-05-14T00:31:43.421237343Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:fb0f5dac5fa74463b801d11598454c00462609b582d17052195012e5f682c2ba\"" May 14 00:31:43.431377 env[1215]: time="2025-05-14T00:31:43.431347126Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 14 00:31:44.664490 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1332749757.mount: Deactivated successfully. May 14 00:31:45.079017 env[1215]: time="2025-05-14T00:31:45.078906354Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:45.080391 env[1215]: time="2025-05-14T00:31:45.080353362Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:45.082462 env[1215]: time="2025-05-14T00:31:45.082426079Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:45.083003 env[1215]: time="2025-05-14T00:31:45.082974755Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:45.084004 env[1215]: time="2025-05-14T00:31:45.083972796Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed\"" May 14 00:31:45.092743 env[1215]: time="2025-05-14T00:31:45.092715779Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 14 00:31:45.616927 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1282608529.mount: Deactivated successfully. May 14 00:31:46.698092 env[1215]: time="2025-05-14T00:31:46.698026464Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:46.700174 env[1215]: time="2025-05-14T00:31:46.700135830Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:46.701754 env[1215]: time="2025-05-14T00:31:46.701727682Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:46.704325 env[1215]: time="2025-05-14T00:31:46.704291288Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:46.704999 env[1215]: time="2025-05-14T00:31:46.704970595Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" May 14 00:31:46.712679 env[1215]: time="2025-05-14T00:31:46.712653717Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 14 00:31:47.152923 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3187209519.mount: Deactivated successfully. May 14 00:31:47.156137 env[1215]: time="2025-05-14T00:31:47.156096922Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:47.157402 env[1215]: time="2025-05-14T00:31:47.157365945Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:47.158841 env[1215]: time="2025-05-14T00:31:47.158812023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:47.159997 env[1215]: time="2025-05-14T00:31:47.159967729Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:47.160660 env[1215]: time="2025-05-14T00:31:47.160613010Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" May 14 00:31:47.169662 env[1215]: time="2025-05-14T00:31:47.169635135Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 14 00:31:47.656516 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount459473943.mount: Deactivated successfully. May 14 00:31:50.684216 env[1215]: time="2025-05-14T00:31:50.684159160Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:50.685729 env[1215]: time="2025-05-14T00:31:50.685692675Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:50.687439 env[1215]: time="2025-05-14T00:31:50.687405847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:50.689413 env[1215]: time="2025-05-14T00:31:50.689384951Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:50.690263 env[1215]: time="2025-05-14T00:31:50.690232375Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd\"" May 14 00:31:53.430405 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 14 00:31:53.430596 systemd[1]: Stopped kubelet.service. May 14 00:31:53.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:53.432043 systemd[1]: Starting kubelet.service... May 14 00:31:53.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:53.435757 kernel: audit: type=1130 audit(1747182713.429:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:53.435818 kernel: audit: type=1131 audit(1747182713.429:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:53.516241 systemd[1]: Started kubelet.service. May 14 00:31:53.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:53.519805 kernel: audit: type=1130 audit(1747182713.515:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:53.554979 kubelet[1632]: E0514 00:31:53.554942 1632 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 14 00:31:53.556899 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 14 00:31:53.557026 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 14 00:31:53.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:31:53.559804 kernel: audit: type=1131 audit(1747182713.556:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:31:55.540120 systemd[1]: Stopped kubelet.service. May 14 00:31:55.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:55.542593 systemd[1]: Starting kubelet.service... May 14 00:31:55.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:55.545363 kernel: audit: type=1130 audit(1747182715.539:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:55.545421 kernel: audit: type=1131 audit(1747182715.539:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:55.557562 systemd[1]: Reloading. May 14 00:31:55.625570 /usr/lib/systemd/system-generators/torcx-generator[1668]: time="2025-05-14T00:31:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:31:55.625597 /usr/lib/systemd/system-generators/torcx-generator[1668]: time="2025-05-14T00:31:55Z" level=info msg="torcx already run" May 14 00:31:55.786058 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:31:55.786078 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:31:55.804294 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:31:55.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.866888 kernel: audit: type=1400 audit(1747182715.860:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.866960 kernel: audit: type=1400 audit(1747182715.860:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.866993 kernel: audit: type=1400 audit(1747182715.860:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871377 kernel: audit: type=1400 audit(1747182715.860:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.862000 audit: BPF prog-id=46 op=LOAD May 14 00:31:55.862000 audit: BPF prog-id=30 op=UNLOAD May 14 00:31:55.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.865000 audit: BPF prog-id=47 op=LOAD May 14 00:31:55.865000 audit: BPF prog-id=39 op=UNLOAD May 14 00:31:55.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.867000 audit: BPF prog-id=48 op=LOAD May 14 00:31:55.867000 audit: BPF prog-id=44 op=UNLOAD May 14 00:31:55.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit: BPF prog-id=49 op=LOAD May 14 00:31:55.869000 audit: BPF prog-id=41 op=UNLOAD May 14 00:31:55.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit: BPF prog-id=50 op=LOAD May 14 00:31:55.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.869000 audit: BPF prog-id=51 op=LOAD May 14 00:31:55.869000 audit: BPF prog-id=42 op=UNLOAD May 14 00:31:55.869000 audit: BPF prog-id=43 op=UNLOAD May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit: BPF prog-id=52 op=LOAD May 14 00:31:55.871000 audit: BPF prog-id=31 op=UNLOAD May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit: BPF prog-id=53 op=LOAD May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.871000 audit: BPF prog-id=54 op=LOAD May 14 00:31:55.871000 audit: BPF prog-id=32 op=UNLOAD May 14 00:31:55.871000 audit: BPF prog-id=33 op=UNLOAD May 14 00:31:55.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit: BPF prog-id=55 op=LOAD May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit: BPF prog-id=56 op=LOAD May 14 00:31:55.874000 audit: BPF prog-id=34 op=UNLOAD May 14 00:31:55.874000 audit: BPF prog-id=35 op=UNLOAD May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit: BPF prog-id=57 op=LOAD May 14 00:31:55.874000 audit: BPF prog-id=36 op=UNLOAD May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit: BPF prog-id=58 op=LOAD May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.874000 audit: BPF prog-id=59 op=LOAD May 14 00:31:55.874000 audit: BPF prog-id=37 op=UNLOAD May 14 00:31:55.874000 audit: BPF prog-id=38 op=UNLOAD May 14 00:31:55.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:55.875000 audit: BPF prog-id=60 op=LOAD May 14 00:31:55.875000 audit: BPF prog-id=40 op=UNLOAD May 14 00:31:55.885413 systemd[1]: Started kubelet.service. May 14 00:31:55.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:55.889118 systemd[1]: Stopping kubelet.service... May 14 00:31:55.889580 systemd[1]: kubelet.service: Deactivated successfully. May 14 00:31:55.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:55.889742 systemd[1]: Stopped kubelet.service. May 14 00:31:55.891610 systemd[1]: Starting kubelet.service... May 14 00:31:55.973474 systemd[1]: Started kubelet.service. May 14 00:31:55.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:31:56.014928 kubelet[1717]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:31:56.014928 kubelet[1717]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 14 00:31:56.014928 kubelet[1717]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:31:56.015925 kubelet[1717]: I0514 00:31:56.015881 1717 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 14 00:31:56.823978 kubelet[1717]: I0514 00:31:56.823933 1717 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 14 00:31:56.823978 kubelet[1717]: I0514 00:31:56.823964 1717 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 14 00:31:56.824183 kubelet[1717]: I0514 00:31:56.824160 1717 server.go:927] "Client rotation is on, will bootstrap in background" May 14 00:31:56.862727 kubelet[1717]: E0514 00:31:56.862692 1717 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.19:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:56.863102 kubelet[1717]: I0514 00:31:56.863077 1717 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 14 00:31:56.873635 kubelet[1717]: I0514 00:31:56.873602 1717 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 14 00:31:56.873920 kubelet[1717]: I0514 00:31:56.873886 1717 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 14 00:31:56.874083 kubelet[1717]: I0514 00:31:56.873916 1717 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 14 00:31:56.874193 kubelet[1717]: I0514 00:31:56.874158 1717 topology_manager.go:138] "Creating topology manager with none policy" May 14 00:31:56.874193 kubelet[1717]: I0514 00:31:56.874168 1717 container_manager_linux.go:301] "Creating device plugin manager" May 14 00:31:56.874440 kubelet[1717]: I0514 00:31:56.874412 1717 state_mem.go:36] "Initialized new in-memory state store" May 14 00:31:56.877170 kubelet[1717]: I0514 00:31:56.877148 1717 kubelet.go:400] "Attempting to sync node with API server" May 14 00:31:56.878019 kubelet[1717]: I0514 00:31:56.877985 1717 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 14 00:31:56.878094 kubelet[1717]: W0514 00:31:56.878054 1717 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.19:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:56.878121 kubelet[1717]: E0514 00:31:56.878113 1717 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.19:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:56.878249 kubelet[1717]: I0514 00:31:56.878232 1717 kubelet.go:312] "Adding apiserver pod source" May 14 00:31:56.878331 kubelet[1717]: I0514 00:31:56.878319 1717 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 14 00:31:56.879370 kubelet[1717]: W0514 00:31:56.879326 1717 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.19:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:56.879462 kubelet[1717]: E0514 00:31:56.879380 1717 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.19:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:56.879614 kubelet[1717]: I0514 00:31:56.879345 1717 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 14 00:31:56.880334 kubelet[1717]: I0514 00:31:56.880304 1717 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 14 00:31:56.880384 kubelet[1717]: W0514 00:31:56.880359 1717 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 14 00:31:56.881171 kubelet[1717]: I0514 00:31:56.881139 1717 server.go:1264] "Started kubelet" May 14 00:31:56.881365 kubelet[1717]: I0514 00:31:56.881338 1717 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 14 00:31:56.881630 kubelet[1717]: I0514 00:31:56.881574 1717 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 14 00:31:56.881847 kubelet[1717]: I0514 00:31:56.881826 1717 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 14 00:31:56.882503 kubelet[1717]: I0514 00:31:56.882484 1717 server.go:455] "Adding debug handlers to kubelet server" May 14 00:31:56.882000 audit[1717]: AVC avc: denied { mac_admin } for pid=1717 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:56.882000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:31:56.882000 audit[1717]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000055380 a1=4000a4c9f0 a2=4000055320 a3=25 items=0 ppid=1 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.882000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:31:56.885034 kubelet[1717]: I0514 00:31:56.885012 1717 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 14 00:31:56.883000 audit[1717]: AVC avc: denied { mac_admin } for pid=1717 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:56.883000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:31:56.883000 audit[1717]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009be6c0 a1=4000a4ca08 a2=40000554a0 a3=25 items=0 ppid=1 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.883000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:31:56.885302 kubelet[1717]: I0514 00:31:56.885285 1717 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 14 00:31:56.885414 kubelet[1717]: I0514 00:31:56.885401 1717 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 14 00:31:56.885693 kubelet[1717]: E0514 00:31:56.884864 1717 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.19:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.19:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183f3d6c8d668be0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-14 00:31:56.881112032 +0000 UTC m=+0.903633034,LastTimestamp:2025-05-14 00:31:56.881112032 +0000 UTC m=+0.903633034,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 14 00:31:56.886220 kubelet[1717]: I0514 00:31:56.886194 1717 volume_manager.go:291] "Starting Kubelet Volume Manager" May 14 00:31:56.886324 kubelet[1717]: I0514 00:31:56.886306 1717 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 14 00:31:56.887298 kubelet[1717]: I0514 00:31:56.887276 1717 reconciler.go:26] "Reconciler: start to sync state" May 14 00:31:56.887666 kubelet[1717]: W0514 00:31:56.887605 1717 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.19:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:56.887724 kubelet[1717]: E0514 00:31:56.887678 1717 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.19:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:56.887724 kubelet[1717]: E0514 00:31:56.887696 1717 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 14 00:31:56.888165 kubelet[1717]: I0514 00:31:56.888141 1717 factory.go:221] Registration of the systemd container factory successfully May 14 00:31:56.888248 kubelet[1717]: I0514 00:31:56.888226 1717 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 14 00:31:56.889125 kubelet[1717]: I0514 00:31:56.889095 1717 factory.go:221] Registration of the containerd container factory successfully May 14 00:31:56.889940 kubelet[1717]: E0514 00:31:56.889904 1717 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.19:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.19:6443: connect: connection refused" interval="200ms" May 14 00:31:56.889000 audit[1729]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:56.889000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc8a7b440 a2=0 a3=1 items=0 ppid=1717 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 14 00:31:56.890000 audit[1730]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:56.890000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd90e0830 a2=0 a3=1 items=0 ppid=1717 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 14 00:31:56.891000 audit[1732]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:56.891000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd63ab230 a2=0 a3=1 items=0 ppid=1717 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.891000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:31:56.893000 audit[1734]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:56.893000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd76073e0 a2=0 a3=1 items=0 ppid=1717 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:31:56.899642 kubelet[1717]: I0514 00:31:56.899623 1717 cpu_manager.go:214] "Starting CPU manager" policy="none" May 14 00:31:56.899642 kubelet[1717]: I0514 00:31:56.899638 1717 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 14 00:31:56.899725 kubelet[1717]: I0514 00:31:56.899654 1717 state_mem.go:36] "Initialized new in-memory state store" May 14 00:31:56.900000 audit[1740]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:56.900000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffec8f0cf0 a2=0 a3=1 items=0 ppid=1717 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 14 00:31:56.902654 kubelet[1717]: I0514 00:31:56.902617 1717 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 14 00:31:56.901000 audit[1742]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:31:56.901000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc5319850 a2=0 a3=1 items=0 ppid=1717 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 14 00:31:56.903592 kubelet[1717]: I0514 00:31:56.903580 1717 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 14 00:31:56.901000 audit[1743]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:56.901000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc4178db0 a2=0 a3=1 items=0 ppid=1717 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 14 00:31:56.903841 kubelet[1717]: I0514 00:31:56.903730 1717 status_manager.go:217] "Starting to sync pod status with apiserver" May 14 00:31:56.903841 kubelet[1717]: I0514 00:31:56.903749 1717 kubelet.go:2337] "Starting kubelet main sync loop" May 14 00:31:56.903841 kubelet[1717]: E0514 00:31:56.903802 1717 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 14 00:31:56.904672 kubelet[1717]: W0514 00:31:56.904631 1717 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.19:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:56.904752 kubelet[1717]: E0514 00:31:56.904678 1717 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.19:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:56.903000 audit[1746]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:31:56.903000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0a79a70 a2=0 a3=1 items=0 ppid=1717 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 14 00:31:56.903000 audit[1747]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:56.903000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1477c40 a2=0 a3=1 items=0 ppid=1717 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 14 00:31:56.904000 audit[1748]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:31:56.904000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcf2ea420 a2=0 a3=1 items=0 ppid=1717 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 14 00:31:56.904000 audit[1749]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:31:56.904000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd22a59a0 a2=0 a3=1 items=0 ppid=1717 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 14 00:31:56.905000 audit[1750]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:31:56.905000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc2d2eee0 a2=0 a3=1 items=0 ppid=1717 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:56.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 14 00:31:56.987452 kubelet[1717]: I0514 00:31:56.987410 1717 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 14 00:31:56.988048 kubelet[1717]: E0514 00:31:56.987990 1717 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.19:6443/api/v1/nodes\": dial tcp 10.0.0.19:6443: connect: connection refused" node="localhost" May 14 00:31:57.004381 kubelet[1717]: E0514 00:31:57.004360 1717 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 14 00:31:57.057409 kubelet[1717]: I0514 00:31:57.057380 1717 policy_none.go:49] "None policy: Start" May 14 00:31:57.058230 kubelet[1717]: I0514 00:31:57.058213 1717 memory_manager.go:170] "Starting memorymanager" policy="None" May 14 00:31:57.058279 kubelet[1717]: I0514 00:31:57.058240 1717 state_mem.go:35] "Initializing new in-memory state store" May 14 00:31:57.064059 systemd[1]: Created slice kubepods.slice. May 14 00:31:57.067806 systemd[1]: Created slice kubepods-besteffort.slice. May 14 00:31:57.078847 systemd[1]: Created slice kubepods-burstable.slice. May 14 00:31:57.079946 kubelet[1717]: I0514 00:31:57.079925 1717 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 14 00:31:57.079000 audit[1717]: AVC avc: denied { mac_admin } for pid=1717 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:57.079000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:31:57.079000 audit[1717]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f04570 a1=4000db4678 a2=4000f04540 a3=25 items=0 ppid=1 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:57.079000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:31:57.080178 kubelet[1717]: I0514 00:31:57.079991 1717 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 14 00:31:57.080178 kubelet[1717]: I0514 00:31:57.080088 1717 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 14 00:31:57.080227 kubelet[1717]: I0514 00:31:57.080184 1717 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 14 00:31:57.081455 kubelet[1717]: E0514 00:31:57.081429 1717 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 14 00:31:57.090355 kubelet[1717]: E0514 00:31:57.090323 1717 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.19:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.19:6443: connect: connection refused" interval="400ms" May 14 00:31:57.189139 kubelet[1717]: I0514 00:31:57.189116 1717 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 14 00:31:57.189562 kubelet[1717]: E0514 00:31:57.189528 1717 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.19:6443/api/v1/nodes\": dial tcp 10.0.0.19:6443: connect: connection refused" node="localhost" May 14 00:31:57.204708 kubelet[1717]: I0514 00:31:57.204659 1717 topology_manager.go:215] "Topology Admit Handler" podUID="7f76134c7c85142d0bca0c10316d2c49" podNamespace="kube-system" podName="kube-apiserver-localhost" May 14 00:31:57.206163 kubelet[1717]: I0514 00:31:57.205637 1717 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 14 00:31:57.207404 kubelet[1717]: I0514 00:31:57.207373 1717 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 14 00:31:57.211343 systemd[1]: Created slice kubepods-burstable-pod7f76134c7c85142d0bca0c10316d2c49.slice. May 14 00:31:57.225174 systemd[1]: Created slice kubepods-burstable-pod6ece95f10dbffa04b25ec3439a115512.slice. May 14 00:31:57.237670 systemd[1]: Created slice kubepods-burstable-podb20b39a8540dba87b5883a6f0f602dba.slice. May 14 00:31:57.289276 kubelet[1717]: I0514 00:31:57.289249 1717 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7f76134c7c85142d0bca0c10316d2c49-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"7f76134c7c85142d0bca0c10316d2c49\") " pod="kube-system/kube-apiserver-localhost" May 14 00:31:57.289420 kubelet[1717]: I0514 00:31:57.289285 1717 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7f76134c7c85142d0bca0c10316d2c49-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"7f76134c7c85142d0bca0c10316d2c49\") " pod="kube-system/kube-apiserver-localhost" May 14 00:31:57.289420 kubelet[1717]: I0514 00:31:57.289305 1717 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7f76134c7c85142d0bca0c10316d2c49-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"7f76134c7c85142d0bca0c10316d2c49\") " pod="kube-system/kube-apiserver-localhost" May 14 00:31:57.289420 kubelet[1717]: I0514 00:31:57.289323 1717 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:31:57.289420 kubelet[1717]: I0514 00:31:57.289339 1717 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:31:57.289420 kubelet[1717]: I0514 00:31:57.289354 1717 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 14 00:31:57.289552 kubelet[1717]: I0514 00:31:57.289370 1717 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:31:57.289552 kubelet[1717]: I0514 00:31:57.289384 1717 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:31:57.289552 kubelet[1717]: I0514 00:31:57.289400 1717 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:31:57.491763 kubelet[1717]: E0514 00:31:57.491622 1717 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.19:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.19:6443: connect: connection refused" interval="800ms" May 14 00:31:57.525010 kubelet[1717]: E0514 00:31:57.524960 1717 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:31:57.525639 env[1215]: time="2025-05-14T00:31:57.525589137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:7f76134c7c85142d0bca0c10316d2c49,Namespace:kube-system,Attempt:0,}" May 14 00:31:57.536877 kubelet[1717]: E0514 00:31:57.536827 1717 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:31:57.537295 env[1215]: time="2025-05-14T00:31:57.537260524Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,}" May 14 00:31:57.539892 kubelet[1717]: E0514 00:31:57.539872 1717 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:31:57.540197 env[1215]: time="2025-05-14T00:31:57.540164791Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,}" May 14 00:31:57.590646 kubelet[1717]: I0514 00:31:57.590619 1717 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 14 00:31:57.590974 kubelet[1717]: E0514 00:31:57.590936 1717 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.19:6443/api/v1/nodes\": dial tcp 10.0.0.19:6443: connect: connection refused" node="localhost" May 14 00:31:57.900364 kubelet[1717]: W0514 00:31:57.900216 1717 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.19:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:57.900364 kubelet[1717]: E0514 00:31:57.900287 1717 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.19:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:57.953834 kubelet[1717]: W0514 00:31:57.953745 1717 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.19:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:57.953834 kubelet[1717]: E0514 00:31:57.953834 1717 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.19:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:57.966132 kubelet[1717]: W0514 00:31:57.966089 1717 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.19:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:57.966132 kubelet[1717]: E0514 00:31:57.966134 1717 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.19:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:58.107812 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount817780884.mount: Deactivated successfully. May 14 00:31:58.111832 env[1215]: time="2025-05-14T00:31:58.111788308Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.113185 env[1215]: time="2025-05-14T00:31:58.113154813Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.114967 env[1215]: time="2025-05-14T00:31:58.114913382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.116031 env[1215]: time="2025-05-14T00:31:58.116005867Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.117003 env[1215]: time="2025-05-14T00:31:58.116977391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.119186 env[1215]: time="2025-05-14T00:31:58.119157803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.123173 env[1215]: time="2025-05-14T00:31:58.123132881Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.125814 env[1215]: time="2025-05-14T00:31:58.125762479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.127970 env[1215]: time="2025-05-14T00:31:58.127932819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.128760 env[1215]: time="2025-05-14T00:31:58.128720423Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.129669 env[1215]: time="2025-05-14T00:31:58.129634824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.130535 env[1215]: time="2025-05-14T00:31:58.130503216Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:31:58.165595 env[1215]: time="2025-05-14T00:31:58.165456933Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:31:58.165595 env[1215]: time="2025-05-14T00:31:58.165497466Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:31:58.165595 env[1215]: time="2025-05-14T00:31:58.165507739Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:31:58.165915 env[1215]: time="2025-05-14T00:31:58.165864306Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:31:58.165915 env[1215]: time="2025-05-14T00:31:58.165899123Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:31:58.166052 env[1215]: time="2025-05-14T00:31:58.166019604Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:31:58.166243 env[1215]: time="2025-05-14T00:31:58.166205363Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0f166f99d54db90869640e9e42120017bc8dfcd383b20bd1d114790ee312a627 pid=1777 runtime=io.containerd.runc.v2 May 14 00:31:58.167061 env[1215]: time="2025-05-14T00:31:58.167009236Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a65153db73bfc81c31d37c68656492aef1237541f56d30e8da7522cc58c514b pid=1776 runtime=io.containerd.runc.v2 May 14 00:31:58.168577 env[1215]: time="2025-05-14T00:31:58.168513092Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:31:58.168643 env[1215]: time="2025-05-14T00:31:58.168594678Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:31:58.168672 env[1215]: time="2025-05-14T00:31:58.168636891Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:31:58.168984 env[1215]: time="2025-05-14T00:31:58.168890645Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8debb1c3ce5142e454d13ba139bd64b087798661061117cc0f696f84e575c66f pid=1773 runtime=io.containerd.runc.v2 May 14 00:31:58.180378 systemd[1]: Started cri-containerd-0f166f99d54db90869640e9e42120017bc8dfcd383b20bd1d114790ee312a627.scope. May 14 00:31:58.181419 systemd[1]: Started cri-containerd-2a65153db73bfc81c31d37c68656492aef1237541f56d30e8da7522cc58c514b.scope. May 14 00:31:58.183838 systemd[1]: Started cri-containerd-8debb1c3ce5142e454d13ba139bd64b087798661061117cc0f696f84e575c66f.scope. May 14 00:31:58.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit: BPF prog-id=61 op=LOAD May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=1777 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066313636663939643534646239303836393634306539653432313230 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=1777 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066313636663939643534646239303836393634306539653432313230 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit: BPF prog-id=62 op=LOAD May 14 00:31:58.212000 audit[1800]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=1777 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066313636663939643534646239303836393634306539653432313230 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit: BPF prog-id=63 op=LOAD May 14 00:31:58.212000 audit[1800]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=1777 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066313636663939643534646239303836393634306539653432313230 May 14 00:31:58.212000 audit: BPF prog-id=63 op=UNLOAD May 14 00:31:58.212000 audit: BPF prog-id=62 op=UNLOAD May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.212000 audit: BPF prog-id=64 op=LOAD May 14 00:31:58.212000 audit[1800]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=1777 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066313636663939643534646239303836393634306539653432313230 May 14 00:31:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit: BPF prog-id=65 op=LOAD May 14 00:31:58.218000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1773 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864656262316333636535313432653435346431336261313339626436 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1773 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864656262316333636535313432653435346431336261313339626436 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit: BPF prog-id=66 op=LOAD May 14 00:31:58.218000 audit[1811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1773 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864656262316333636535313432653435346431336261313339626436 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.218000 audit: BPF prog-id=67 op=LOAD May 14 00:31:58.218000 audit[1811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1773 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864656262316333636535313432653435346431336261313339626436 May 14 00:31:58.218000 audit: BPF prog-id=67 op=UNLOAD May 14 00:31:58.219000 audit: BPF prog-id=66 op=UNLOAD May 14 00:31:58.219000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.219000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.219000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.219000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.219000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.219000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.219000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.219000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.219000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.222062 kubelet[1717]: W0514 00:31:58.221432 1717 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.19:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:58.222062 kubelet[1717]: E0514 00:31:58.221489 1717 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.19:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 14 00:31:58.219000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.219000 audit: BPF prog-id=68 op=LOAD May 14 00:31:58.219000 audit[1811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1773 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864656262316333636535313432653435346431336261313339626436 May 14 00:31:58.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit: BPF prog-id=69 op=LOAD May 14 00:31:58.226000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1776 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261363531353364623733626663383163333164333763363836353634 May 14 00:31:58.226000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1776 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261363531353364623733626663383163333164333763363836353634 May 14 00:31:58.226000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.226000 audit: BPF prog-id=70 op=LOAD May 14 00:31:58.226000 audit[1802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1776 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261363531353364623733626663383163333164333763363836353634 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit: BPF prog-id=71 op=LOAD May 14 00:31:58.227000 audit[1802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1776 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261363531353364623733626663383163333164333763363836353634 May 14 00:31:58.227000 audit: BPF prog-id=71 op=UNLOAD May 14 00:31:58.227000 audit: BPF prog-id=70 op=UNLOAD May 14 00:31:58.227000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.227000 audit: BPF prog-id=72 op=LOAD May 14 00:31:58.227000 audit[1802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1776 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261363531353364623733626663383163333164333763363836353634 May 14 00:31:58.241267 env[1215]: time="2025-05-14T00:31:58.241204623Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,} returns sandbox id \"8debb1c3ce5142e454d13ba139bd64b087798661061117cc0f696f84e575c66f\"" May 14 00:31:58.242440 kubelet[1717]: E0514 00:31:58.242181 1717 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:31:58.246147 env[1215]: time="2025-05-14T00:31:58.246103176Z" level=info msg="CreateContainer within sandbox \"8debb1c3ce5142e454d13ba139bd64b087798661061117cc0f696f84e575c66f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 14 00:31:58.247698 env[1215]: time="2025-05-14T00:31:58.247655960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:7f76134c7c85142d0bca0c10316d2c49,Namespace:kube-system,Attempt:0,} returns sandbox id \"0f166f99d54db90869640e9e42120017bc8dfcd383b20bd1d114790ee312a627\"" May 14 00:31:58.248639 kubelet[1717]: E0514 00:31:58.248441 1717 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:31:58.250811 env[1215]: time="2025-05-14T00:31:58.250762766Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,} returns sandbox id \"2a65153db73bfc81c31d37c68656492aef1237541f56d30e8da7522cc58c514b\"" May 14 00:31:58.251508 kubelet[1717]: E0514 00:31:58.251334 1717 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:31:58.252522 env[1215]: time="2025-05-14T00:31:58.252486077Z" level=info msg="CreateContainer within sandbox \"0f166f99d54db90869640e9e42120017bc8dfcd383b20bd1d114790ee312a627\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 14 00:31:58.254190 env[1215]: time="2025-05-14T00:31:58.254159302Z" level=info msg="CreateContainer within sandbox \"2a65153db73bfc81c31d37c68656492aef1237541f56d30e8da7522cc58c514b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 14 00:31:58.269673 env[1215]: time="2025-05-14T00:31:58.269635530Z" level=info msg="CreateContainer within sandbox \"8debb1c3ce5142e454d13ba139bd64b087798661061117cc0f696f84e575c66f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"2a458ce54086385ba086470f1a6a5010f43124e7a27972ef9bca1383593e821d\"" May 14 00:31:58.270419 env[1215]: time="2025-05-14T00:31:58.270393194Z" level=info msg="StartContainer for \"2a458ce54086385ba086470f1a6a5010f43124e7a27972ef9bca1383593e821d\"" May 14 00:31:58.273599 env[1215]: time="2025-05-14T00:31:58.273550527Z" level=info msg="CreateContainer within sandbox \"0f166f99d54db90869640e9e42120017bc8dfcd383b20bd1d114790ee312a627\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f8e9c834b73a7e95b9587f2051d43796a54745c5c8d8b3d2d403fc749d4d1914\"" May 14 00:31:58.274053 env[1215]: time="2025-05-14T00:31:58.274031212Z" level=info msg="StartContainer for \"f8e9c834b73a7e95b9587f2051d43796a54745c5c8d8b3d2d403fc749d4d1914\"" May 14 00:31:58.277214 env[1215]: time="2025-05-14T00:31:58.277168798Z" level=info msg="CreateContainer within sandbox \"2a65153db73bfc81c31d37c68656492aef1237541f56d30e8da7522cc58c514b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"77faa7b4279eb147a66a1b37039f1e66bcc07093cb0bfed36da4555860160b43\"" May 14 00:31:58.277641 env[1215]: time="2025-05-14T00:31:58.277617625Z" level=info msg="StartContainer for \"77faa7b4279eb147a66a1b37039f1e66bcc07093cb0bfed36da4555860160b43\"" May 14 00:31:58.285500 systemd[1]: Started cri-containerd-2a458ce54086385ba086470f1a6a5010f43124e7a27972ef9bca1383593e821d.scope. May 14 00:31:58.292374 kubelet[1717]: E0514 00:31:58.292333 1717 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.19:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.19:6443: connect: connection refused" interval="1.6s" May 14 00:31:58.300246 systemd[1]: Started cri-containerd-f8e9c834b73a7e95b9587f2051d43796a54745c5c8d8b3d2d403fc749d4d1914.scope. May 14 00:31:58.314067 systemd[1]: Started cri-containerd-77faa7b4279eb147a66a1b37039f1e66bcc07093cb0bfed36da4555860160b43.scope. May 14 00:31:58.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit: BPF prog-id=73 op=LOAD May 14 00:31:58.329000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1773 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261343538636535343038363338356261303836343730663161366135 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1773 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261343538636535343038363338356261303836343730663161366135 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit: BPF prog-id=74 op=LOAD May 14 00:31:58.329000 audit[1889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1773 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261343538636535343038363338356261303836343730663161366135 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.329000 audit: BPF prog-id=75 op=LOAD May 14 00:31:58.329000 audit[1889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1773 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261343538636535343038363338356261303836343730663161366135 May 14 00:31:58.330000 audit: BPF prog-id=75 op=UNLOAD May 14 00:31:58.330000 audit: BPF prog-id=74 op=UNLOAD May 14 00:31:58.330000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.330000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.330000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.330000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.330000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.330000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.330000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.330000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.330000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.330000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.330000 audit: BPF prog-id=76 op=LOAD May 14 00:31:58.330000 audit[1889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1773 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261343538636535343038363338356261303836343730663161366135 May 14 00:31:58.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.331000 audit: BPF prog-id=77 op=LOAD May 14 00:31:58.332000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.332000 audit[1906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1777 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653963383334623733613765393562393538376632303531643433 May 14 00:31:58.332000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.332000 audit[1906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1777 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653963383334623733613765393562393538376632303531643433 May 14 00:31:58.333000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit: BPF prog-id=78 op=LOAD May 14 00:31:58.333000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.333000 audit: BPF prog-id=79 op=LOAD May 14 00:31:58.333000 audit[1906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1777 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1776 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737666161376234323739656231343761363661316233373033396631 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1776 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737666161376234323739656231343761363661316233373033396631 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit: BPF prog-id=80 op=LOAD May 14 00:31:58.334000 audit[1917]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1776 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737666161376234323739656231343761363661316233373033396631 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit: BPF prog-id=81 op=LOAD May 14 00:31:58.334000 audit[1917]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1776 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737666161376234323739656231343761363661316233373033396631 May 14 00:31:58.334000 audit: BPF prog-id=81 op=UNLOAD May 14 00:31:58.334000 audit: BPF prog-id=80 op=UNLOAD May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.334000 audit: BPF prog-id=82 op=LOAD May 14 00:31:58.334000 audit[1917]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1776 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737666161376234323739656231343761363661316233373033396631 May 14 00:31:58.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653963383334623733613765393562393538376632303531643433 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit: BPF prog-id=83 op=LOAD May 14 00:31:58.338000 audit[1906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1777 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653963383334623733613765393562393538376632303531643433 May 14 00:31:58.338000 audit: BPF prog-id=83 op=UNLOAD May 14 00:31:58.338000 audit: BPF prog-id=79 op=UNLOAD May 14 00:31:58.338000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:31:58.338000 audit: BPF prog-id=84 op=LOAD May 14 00:31:58.338000 audit[1906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1777 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:31:58.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653963383334623733613765393562393538376632303531643433 May 14 00:31:58.352082 env[1215]: time="2025-05-14T00:31:58.351966351Z" level=info msg="StartContainer for \"2a458ce54086385ba086470f1a6a5010f43124e7a27972ef9bca1383593e821d\" returns successfully" May 14 00:31:58.369711 env[1215]: time="2025-05-14T00:31:58.367116712Z" level=info msg="StartContainer for \"f8e9c834b73a7e95b9587f2051d43796a54745c5c8d8b3d2d403fc749d4d1914\" returns successfully" May 14 00:31:58.400196 kubelet[1717]: I0514 00:31:58.395795 1717 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 14 00:31:58.400196 kubelet[1717]: E0514 00:31:58.396202 1717 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.19:6443/api/v1/nodes\": dial tcp 10.0.0.19:6443: connect: connection refused" node="localhost" May 14 00:31:58.411187 env[1215]: time="2025-05-14T00:31:58.411128459Z" level=info msg="StartContainer for \"77faa7b4279eb147a66a1b37039f1e66bcc07093cb0bfed36da4555860160b43\" returns successfully" May 14 00:31:58.910466 kubelet[1717]: E0514 00:31:58.910431 1717 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:31:58.912210 kubelet[1717]: E0514 00:31:58.912185 1717 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:31:58.913687 kubelet[1717]: E0514 00:31:58.913656 1717 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:31:59.599197 kernel: kauditd_printk_skb: 561 callbacks suppressed May 14 00:31:59.599335 kernel: audit: type=1400 audit(1747182719.588:557): avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:31:59.599361 kernel: audit: type=1400 audit(1747182719.588:558): avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:31:59.599377 kernel: audit: type=1300 audit(1747182719.588:557): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4007d4e720 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:31:59.588000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:31:59.588000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:31:59.588000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4007d4e720 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:31:59.588000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400886d7a0 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:31:59.605317 kernel: audit: type=1300 audit(1747182719.588:558): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400886d7a0 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:31:59.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:31:59.610408 kernel: audit: type=1327 audit(1747182719.588:557): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:31:59.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:31:59.625154 kernel: audit: type=1327 audit(1747182719.588:558): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:31:59.588000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:31:59.628328 kernel: audit: type=1400 audit(1747182719.588:559): avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:31:59.588000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=400886d8c0 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:31:59.632436 kernel: audit: type=1300 audit(1747182719.588:559): arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=400886d8c0 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:31:59.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:31:59.639569 kernel: audit: type=1327 audit(1747182719.588:559): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:31:59.588000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:31:59.643606 kernel: audit: type=1400 audit(1747182719.588:560): avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:31:59.588000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=4006842ee0 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:31:59.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:31:59.588000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:31:59.588000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=400886daa0 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:31:59.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:31:59.599000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:31:59.599000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4005c634a0 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:31:59.599000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:31:59.881064 kubelet[1717]: I0514 00:31:59.880966 1717 apiserver.go:52] "Watching apiserver" May 14 00:31:59.886562 kubelet[1717]: I0514 00:31:59.886534 1717 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 14 00:31:59.895965 kubelet[1717]: E0514 00:31:59.895936 1717 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 14 00:31:59.915534 kubelet[1717]: E0514 00:31:59.915507 1717 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:31:59.988013 kubelet[1717]: E0514 00:31:59.987983 1717 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found May 14 00:31:59.997816 kubelet[1717]: I0514 00:31:59.997793 1717 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 14 00:32:00.004599 kubelet[1717]: I0514 00:32:00.004572 1717 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 14 00:32:00.179618 kubelet[1717]: E0514 00:32:00.179522 1717 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 14 00:32:00.179856 kubelet[1717]: E0514 00:32:00.179838 1717 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:00.724000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:00.724000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40003fb260 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:32:00.724000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:32:00.724000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:00.724000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40001d4320 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:32:00.724000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:32:01.434017 systemd[1]: Reloading. May 14 00:32:01.482879 /usr/lib/systemd/system-generators/torcx-generator[2017]: time="2025-05-14T00:32:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:32:01.482909 /usr/lib/systemd/system-generators/torcx-generator[2017]: time="2025-05-14T00:32:01Z" level=info msg="torcx already run" May 14 00:32:01.545047 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:32:01.545065 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:32:01.562936 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:32:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.632000 audit: BPF prog-id=85 op=LOAD May 14 00:32:01.632000 audit: BPF prog-id=46 op=UNLOAD May 14 00:32:01.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.633000 audit: BPF prog-id=86 op=LOAD May 14 00:32:01.633000 audit: BPF prog-id=73 op=UNLOAD May 14 00:32:01.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit: BPF prog-id=87 op=LOAD May 14 00:32:01.634000 audit: BPF prog-id=47 op=UNLOAD May 14 00:32:01.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.635000 audit: BPF prog-id=88 op=LOAD May 14 00:32:01.635000 audit: BPF prog-id=69 op=UNLOAD May 14 00:32:01.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.638000 audit: BPF prog-id=89 op=LOAD May 14 00:32:01.638000 audit: BPF prog-id=48 op=UNLOAD May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit: BPF prog-id=90 op=LOAD May 14 00:32:01.639000 audit: BPF prog-id=49 op=UNLOAD May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit: BPF prog-id=91 op=LOAD May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.639000 audit: BPF prog-id=92 op=LOAD May 14 00:32:01.640000 audit: BPF prog-id=50 op=UNLOAD May 14 00:32:01.640000 audit: BPF prog-id=51 op=UNLOAD May 14 00:32:01.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.641000 audit: BPF prog-id=93 op=LOAD May 14 00:32:01.641000 audit: BPF prog-id=52 op=UNLOAD May 14 00:32:01.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit: BPF prog-id=94 op=LOAD May 14 00:32:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.642000 audit: BPF prog-id=95 op=LOAD May 14 00:32:01.642000 audit: BPF prog-id=53 op=UNLOAD May 14 00:32:01.642000 audit: BPF prog-id=54 op=UNLOAD May 14 00:32:01.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.643000 audit: BPF prog-id=96 op=LOAD May 14 00:32:01.643000 audit: BPF prog-id=77 op=UNLOAD May 14 00:32:01.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.648000 audit: BPF prog-id=97 op=LOAD May 14 00:32:01.648000 audit: BPF prog-id=61 op=UNLOAD May 14 00:32:01.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit: BPF prog-id=98 op=LOAD May 14 00:32:01.649000 audit: BPF prog-id=65 op=UNLOAD May 14 00:32:01.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.649000 audit: BPF prog-id=99 op=LOAD May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit: BPF prog-id=100 op=LOAD May 14 00:32:01.650000 audit: BPF prog-id=55 op=UNLOAD May 14 00:32:01.650000 audit: BPF prog-id=56 op=UNLOAD May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit: BPF prog-id=101 op=LOAD May 14 00:32:01.650000 audit: BPF prog-id=57 op=UNLOAD May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit: BPF prog-id=102 op=LOAD May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.650000 audit: BPF prog-id=103 op=LOAD May 14 00:32:01.650000 audit: BPF prog-id=58 op=UNLOAD May 14 00:32:01.650000 audit: BPF prog-id=59 op=UNLOAD May 14 00:32:01.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.651000 audit: BPF prog-id=104 op=LOAD May 14 00:32:01.651000 audit: BPF prog-id=78 op=UNLOAD May 14 00:32:01.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.652000 audit: BPF prog-id=105 op=LOAD May 14 00:32:01.652000 audit: BPF prog-id=60 op=UNLOAD May 14 00:32:01.666799 kubelet[1717]: I0514 00:32:01.666648 1717 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 14 00:32:01.666955 systemd[1]: Stopping kubelet.service... May 14 00:32:01.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:01.691857 systemd[1]: kubelet.service: Deactivated successfully. May 14 00:32:01.692036 systemd[1]: Stopped kubelet.service. May 14 00:32:01.692100 systemd[1]: kubelet.service: Consumed 1.221s CPU time. May 14 00:32:01.694040 systemd[1]: Starting kubelet.service... May 14 00:32:01.778194 systemd[1]: Started kubelet.service. May 14 00:32:01.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:01.825875 kubelet[2059]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:32:01.825875 kubelet[2059]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 14 00:32:01.825875 kubelet[2059]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:32:01.826287 kubelet[2059]: I0514 00:32:01.825917 2059 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 14 00:32:01.830932 kubelet[2059]: I0514 00:32:01.830765 2059 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 14 00:32:01.830932 kubelet[2059]: I0514 00:32:01.830797 2059 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 14 00:32:01.831233 kubelet[2059]: I0514 00:32:01.831198 2059 server.go:927] "Client rotation is on, will bootstrap in background" May 14 00:32:01.833040 kubelet[2059]: I0514 00:32:01.833014 2059 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 14 00:32:01.834832 kubelet[2059]: I0514 00:32:01.834750 2059 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 14 00:32:01.842989 kubelet[2059]: I0514 00:32:01.842969 2059 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 14 00:32:01.843330 kubelet[2059]: I0514 00:32:01.843302 2059 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 14 00:32:01.843564 kubelet[2059]: I0514 00:32:01.843394 2059 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 14 00:32:01.843680 kubelet[2059]: I0514 00:32:01.843667 2059 topology_manager.go:138] "Creating topology manager with none policy" May 14 00:32:01.843754 kubelet[2059]: I0514 00:32:01.843743 2059 container_manager_linux.go:301] "Creating device plugin manager" May 14 00:32:01.843869 kubelet[2059]: I0514 00:32:01.843857 2059 state_mem.go:36] "Initialized new in-memory state store" May 14 00:32:01.844015 kubelet[2059]: I0514 00:32:01.844005 2059 kubelet.go:400] "Attempting to sync node with API server" May 14 00:32:01.844764 kubelet[2059]: I0514 00:32:01.844750 2059 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 14 00:32:01.844899 kubelet[2059]: I0514 00:32:01.844888 2059 kubelet.go:312] "Adding apiserver pod source" May 14 00:32:01.850764 kubelet[2059]: I0514 00:32:01.849198 2059 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 14 00:32:01.852036 kubelet[2059]: I0514 00:32:01.852014 2059 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 14 00:32:01.852923 kubelet[2059]: I0514 00:32:01.852904 2059 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 14 00:32:01.853317 kubelet[2059]: I0514 00:32:01.853299 2059 server.go:1264] "Started kubelet" May 14 00:32:01.854415 kubelet[2059]: I0514 00:32:01.854156 2059 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 14 00:32:01.854475 kubelet[2059]: I0514 00:32:01.854421 2059 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 14 00:32:01.854475 kubelet[2059]: I0514 00:32:01.854453 2059 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 14 00:32:01.855303 kubelet[2059]: I0514 00:32:01.855271 2059 server.go:455] "Adding debug handlers to kubelet server" May 14 00:32:01.855747 kubelet[2059]: I0514 00:32:01.855714 2059 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 14 00:32:01.855828 kubelet[2059]: I0514 00:32:01.855754 2059 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 14 00:32:01.855828 kubelet[2059]: I0514 00:32:01.855795 2059 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 14 00:32:01.853000 audit[2059]: AVC avc: denied { mac_admin } for pid=2059 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.853000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:32:01.853000 audit[2059]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d54600 a1=4000b6c9d8 a2=4000d545d0 a3=25 items=0 ppid=1 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:01.853000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:32:01.853000 audit[2059]: AVC avc: denied { mac_admin } for pid=2059 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.853000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:32:01.853000 audit[2059]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40000ead60 a1=4000b6c9f0 a2=4000d54690 a3=25 items=0 ppid=1 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:01.853000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:32:01.865111 kubelet[2059]: I0514 00:32:01.865073 2059 volume_manager.go:291] "Starting Kubelet Volume Manager" May 14 00:32:01.866212 kubelet[2059]: I0514 00:32:01.866182 2059 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 14 00:32:01.866425 kubelet[2059]: I0514 00:32:01.866409 2059 reconciler.go:26] "Reconciler: start to sync state" May 14 00:32:01.867143 kubelet[2059]: I0514 00:32:01.867109 2059 factory.go:221] Registration of the systemd container factory successfully May 14 00:32:01.867401 kubelet[2059]: I0514 00:32:01.867355 2059 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 14 00:32:01.868974 kubelet[2059]: E0514 00:32:01.868937 2059 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 14 00:32:01.869096 kubelet[2059]: I0514 00:32:01.869066 2059 factory.go:221] Registration of the containerd container factory successfully May 14 00:32:01.884204 kubelet[2059]: I0514 00:32:01.884168 2059 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 14 00:32:01.885360 kubelet[2059]: I0514 00:32:01.885118 2059 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 14 00:32:01.885494 kubelet[2059]: I0514 00:32:01.885480 2059 status_manager.go:217] "Starting to sync pod status with apiserver" May 14 00:32:01.885590 kubelet[2059]: I0514 00:32:01.885579 2059 kubelet.go:2337] "Starting kubelet main sync loop" May 14 00:32:01.885691 kubelet[2059]: E0514 00:32:01.885674 2059 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 14 00:32:01.903051 kubelet[2059]: I0514 00:32:01.903024 2059 cpu_manager.go:214] "Starting CPU manager" policy="none" May 14 00:32:01.903051 kubelet[2059]: I0514 00:32:01.903044 2059 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 14 00:32:01.903164 kubelet[2059]: I0514 00:32:01.903066 2059 state_mem.go:36] "Initialized new in-memory state store" May 14 00:32:01.903237 kubelet[2059]: I0514 00:32:01.903218 2059 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 14 00:32:01.903269 kubelet[2059]: I0514 00:32:01.903234 2059 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 14 00:32:01.903269 kubelet[2059]: I0514 00:32:01.903252 2059 policy_none.go:49] "None policy: Start" May 14 00:32:01.903845 kubelet[2059]: I0514 00:32:01.903812 2059 memory_manager.go:170] "Starting memorymanager" policy="None" May 14 00:32:01.903845 kubelet[2059]: I0514 00:32:01.903836 2059 state_mem.go:35] "Initializing new in-memory state store" May 14 00:32:01.903980 kubelet[2059]: I0514 00:32:01.903962 2059 state_mem.go:75] "Updated machine memory state" May 14 00:32:01.907862 kubelet[2059]: I0514 00:32:01.907841 2059 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 14 00:32:01.906000 audit[2059]: AVC avc: denied { mac_admin } for pid=2059 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:01.906000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:32:01.906000 audit[2059]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400106a690 a1=40012031d0 a2=400106a660 a3=25 items=0 ppid=1 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:01.906000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:32:01.908229 kubelet[2059]: I0514 00:32:01.908209 2059 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 14 00:32:01.908432 kubelet[2059]: I0514 00:32:01.908398 2059 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 14 00:32:01.908597 kubelet[2059]: I0514 00:32:01.908583 2059 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 14 00:32:01.969043 kubelet[2059]: I0514 00:32:01.968960 2059 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 14 00:32:01.975534 kubelet[2059]: I0514 00:32:01.975504 2059 kubelet_node_status.go:112] "Node was previously registered" node="localhost" May 14 00:32:01.975699 kubelet[2059]: I0514 00:32:01.975685 2059 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 14 00:32:01.986562 kubelet[2059]: I0514 00:32:01.985876 2059 topology_manager.go:215] "Topology Admit Handler" podUID="7f76134c7c85142d0bca0c10316d2c49" podNamespace="kube-system" podName="kube-apiserver-localhost" May 14 00:32:01.986562 kubelet[2059]: I0514 00:32:01.986007 2059 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 14 00:32:01.986562 kubelet[2059]: I0514 00:32:01.986045 2059 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 14 00:32:02.067526 kubelet[2059]: I0514 00:32:02.067486 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7f76134c7c85142d0bca0c10316d2c49-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"7f76134c7c85142d0bca0c10316d2c49\") " pod="kube-system/kube-apiserver-localhost" May 14 00:32:02.067526 kubelet[2059]: I0514 00:32:02.067524 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7f76134c7c85142d0bca0c10316d2c49-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"7f76134c7c85142d0bca0c10316d2c49\") " pod="kube-system/kube-apiserver-localhost" May 14 00:32:02.067705 kubelet[2059]: I0514 00:32:02.067560 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:32:02.067705 kubelet[2059]: I0514 00:32:02.067578 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 14 00:32:02.067705 kubelet[2059]: I0514 00:32:02.067594 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7f76134c7c85142d0bca0c10316d2c49-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"7f76134c7c85142d0bca0c10316d2c49\") " pod="kube-system/kube-apiserver-localhost" May 14 00:32:02.067705 kubelet[2059]: I0514 00:32:02.067609 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:32:02.067705 kubelet[2059]: I0514 00:32:02.067632 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:32:02.067862 kubelet[2059]: I0514 00:32:02.067648 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:32:02.067862 kubelet[2059]: I0514 00:32:02.067665 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:32:02.293045 kubelet[2059]: E0514 00:32:02.292927 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:02.293045 kubelet[2059]: E0514 00:32:02.292960 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:02.293630 kubelet[2059]: E0514 00:32:02.293385 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:02.851341 kubelet[2059]: I0514 00:32:02.851286 2059 apiserver.go:52] "Watching apiserver" May 14 00:32:02.866882 kubelet[2059]: I0514 00:32:02.866838 2059 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 14 00:32:02.896106 kubelet[2059]: E0514 00:32:02.896050 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:02.903796 kubelet[2059]: E0514 00:32:02.900883 2059 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 14 00:32:02.903796 kubelet[2059]: E0514 00:32:02.901182 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:02.903796 kubelet[2059]: E0514 00:32:02.901987 2059 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 14 00:32:02.903796 kubelet[2059]: E0514 00:32:02.902385 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:02.922402 kubelet[2059]: I0514 00:32:02.921809 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.9217915030000001 podStartE2EDuration="1.921791503s" podCreationTimestamp="2025-05-14 00:32:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:32:02.915307766 +0000 UTC m=+1.132763817" watchObservedRunningTime="2025-05-14 00:32:02.921791503 +0000 UTC m=+1.139247514" May 14 00:32:02.922402 kubelet[2059]: I0514 00:32:02.921931 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.921925771 podStartE2EDuration="1.921925771s" podCreationTimestamp="2025-05-14 00:32:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:32:02.921636882 +0000 UTC m=+1.139092933" watchObservedRunningTime="2025-05-14 00:32:02.921925771 +0000 UTC m=+1.139381782" May 14 00:32:03.897889 kubelet[2059]: E0514 00:32:03.897267 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:03.897889 kubelet[2059]: E0514 00:32:03.897333 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:04.899230 kubelet[2059]: E0514 00:32:04.899199 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:06.538485 sudo[1350]: pam_unix(sudo:session): session closed for user root May 14 00:32:06.537000 audit[1350]: USER_END pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:32:06.539287 kernel: kauditd_printk_skb: 272 callbacks suppressed May 14 00:32:06.539346 kernel: audit: type=1106 audit(1747182726.537:814): pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:32:06.540000 audit[1350]: CRED_DISP pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:32:06.543837 sshd[1346]: pam_unix(sshd:session): session closed for user core May 14 00:32:06.545284 kernel: audit: type=1104 audit(1747182726.540:815): pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:32:06.545000 audit[1346]: USER_END pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:06.550283 systemd[1]: sshd@6-10.0.0.19:22-10.0.0.1:49840.service: Deactivated successfully. May 14 00:32:06.545000 audit[1346]: CRED_DISP pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:06.551021 systemd[1]: session-7.scope: Deactivated successfully. May 14 00:32:06.551182 systemd[1]: session-7.scope: Consumed 6.545s CPU time. May 14 00:32:06.551905 systemd-logind[1202]: Session 7 logged out. Waiting for processes to exit. May 14 00:32:06.552712 systemd-logind[1202]: Removed session 7. May 14 00:32:06.553798 kernel: audit: type=1106 audit(1747182726.545:816): pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:06.553844 kernel: audit: type=1104 audit(1747182726.545:817): pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:06.553874 kernel: audit: type=1131 audit(1747182726.549:818): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:49840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:06.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:49840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:06.800361 kubelet[2059]: E0514 00:32:06.800245 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:09.663213 kubelet[2059]: E0514 00:32:09.663130 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:09.677829 kubelet[2059]: I0514 00:32:09.677762 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=8.677732631 podStartE2EDuration="8.677732631s" podCreationTimestamp="2025-05-14 00:32:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:32:02.92845569 +0000 UTC m=+1.145911741" watchObservedRunningTime="2025-05-14 00:32:09.677732631 +0000 UTC m=+7.895188682" May 14 00:32:09.906875 kubelet[2059]: E0514 00:32:09.906851 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:14.340070 kubelet[2059]: E0514 00:32:14.340038 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:15.856000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 14 00:32:15.856000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000bd46c0 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:32:15.864855 kernel: audit: type=1400 audit(1747182735.856:819): avc: denied { watch } for pid=1943 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 14 00:32:15.864938 kernel: audit: type=1300 audit(1747182735.856:819): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000bd46c0 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:32:15.864963 kernel: audit: type=1327 audit(1747182735.856:819): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:32:15.856000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:32:15.995708 update_engine[1206]: I0514 00:32:15.995663 1206 update_attempter.cc:509] Updating boot flags... May 14 00:32:16.807516 kubelet[2059]: E0514 00:32:16.807484 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:16.988000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:16.988000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40019eda20 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:32:16.995823 kernel: audit: type=1400 audit(1747182736.988:820): avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:16.995891 kernel: audit: type=1300 audit(1747182736.988:820): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40019eda20 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:32:16.995918 kernel: audit: type=1327 audit(1747182736.988:820): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:32:16.988000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:32:16.988000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:17.002290 kernel: audit: type=1400 audit(1747182736.988:821): avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:16.988000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40019eda60 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:32:17.006344 kernel: audit: type=1300 audit(1747182736.988:821): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40019eda60 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:32:17.006396 kernel: audit: type=1327 audit(1747182736.988:821): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:32:16.988000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:32:16.988000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:17.012615 kernel: audit: type=1400 audit(1747182736.988:822): avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:16.988000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001b80700 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:32:16.988000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:32:16.988000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:16.988000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001ce8900 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:32:16.988000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:32:18.102972 kubelet[2059]: I0514 00:32:18.102923 2059 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 14 00:32:18.103591 env[1215]: time="2025-05-14T00:32:18.103504908Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 14 00:32:18.103980 kubelet[2059]: I0514 00:32:18.103960 2059 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 14 00:32:18.953901 kubelet[2059]: I0514 00:32:18.953856 2059 topology_manager.go:215] "Topology Admit Handler" podUID="5590f9e4-a66a-47e3-aa77-66d33e9959a2" podNamespace="kube-system" podName="kube-proxy-b7smw" May 14 00:32:18.959579 systemd[1]: Created slice kubepods-besteffort-pod5590f9e4_a66a_47e3_aa77_66d33e9959a2.slice. May 14 00:32:18.988927 kubelet[2059]: I0514 00:32:18.988893 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5590f9e4-a66a-47e3-aa77-66d33e9959a2-lib-modules\") pod \"kube-proxy-b7smw\" (UID: \"5590f9e4-a66a-47e3-aa77-66d33e9959a2\") " pod="kube-system/kube-proxy-b7smw" May 14 00:32:18.988927 kubelet[2059]: I0514 00:32:18.988927 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cnz4f\" (UniqueName: \"kubernetes.io/projected/5590f9e4-a66a-47e3-aa77-66d33e9959a2-kube-api-access-cnz4f\") pod \"kube-proxy-b7smw\" (UID: \"5590f9e4-a66a-47e3-aa77-66d33e9959a2\") " pod="kube-system/kube-proxy-b7smw" May 14 00:32:18.989063 kubelet[2059]: I0514 00:32:18.988949 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/5590f9e4-a66a-47e3-aa77-66d33e9959a2-kube-proxy\") pod \"kube-proxy-b7smw\" (UID: \"5590f9e4-a66a-47e3-aa77-66d33e9959a2\") " pod="kube-system/kube-proxy-b7smw" May 14 00:32:18.989063 kubelet[2059]: I0514 00:32:18.988967 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5590f9e4-a66a-47e3-aa77-66d33e9959a2-xtables-lock\") pod \"kube-proxy-b7smw\" (UID: \"5590f9e4-a66a-47e3-aa77-66d33e9959a2\") " pod="kube-system/kube-proxy-b7smw" May 14 00:32:19.121478 kubelet[2059]: I0514 00:32:19.121434 2059 topology_manager.go:215] "Topology Admit Handler" podUID="7f169e96-70fe-4fb2-9f20-3302de9a132a" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-6dfpf" May 14 00:32:19.123910 kubelet[2059]: W0514 00:32:19.123855 2059 reflector.go:547] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object May 14 00:32:19.123910 kubelet[2059]: E0514 00:32:19.123903 2059 reflector.go:150] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object May 14 00:32:19.126684 systemd[1]: Created slice kubepods-besteffort-pod7f169e96_70fe_4fb2_9f20_3302de9a132a.slice. May 14 00:32:19.190668 kubelet[2059]: I0514 00:32:19.190624 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8rl7x\" (UniqueName: \"kubernetes.io/projected/7f169e96-70fe-4fb2-9f20-3302de9a132a-kube-api-access-8rl7x\") pod \"tigera-operator-797db67f8-6dfpf\" (UID: \"7f169e96-70fe-4fb2-9f20-3302de9a132a\") " pod="tigera-operator/tigera-operator-797db67f8-6dfpf" May 14 00:32:19.190668 kubelet[2059]: I0514 00:32:19.190670 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7f169e96-70fe-4fb2-9f20-3302de9a132a-var-lib-calico\") pod \"tigera-operator-797db67f8-6dfpf\" (UID: \"7f169e96-70fe-4fb2-9f20-3302de9a132a\") " pod="tigera-operator/tigera-operator-797db67f8-6dfpf" May 14 00:32:19.273147 kubelet[2059]: E0514 00:32:19.273047 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:19.274266 env[1215]: time="2025-05-14T00:32:19.273972297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-b7smw,Uid:5590f9e4-a66a-47e3-aa77-66d33e9959a2,Namespace:kube-system,Attempt:0,}" May 14 00:32:19.286745 env[1215]: time="2025-05-14T00:32:19.286669780Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:32:19.286745 env[1215]: time="2025-05-14T00:32:19.286708099Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:32:19.286745 env[1215]: time="2025-05-14T00:32:19.286718539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:32:19.287019 env[1215]: time="2025-05-14T00:32:19.286987497Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1dbbc07f40b008df51d1393d36bf6c4c53f1e66152853b0dc9cacc3e44280182 pid=2168 runtime=io.containerd.runc.v2 May 14 00:32:19.300811 systemd[1]: Started cri-containerd-1dbbc07f40b008df51d1393d36bf6c4c53f1e66152853b0dc9cacc3e44280182.scope. May 14 00:32:19.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit: BPF prog-id=106 op=LOAD May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164626263303766343062303038646635316431333933643336626636 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164626263303766343062303038646635316431333933643336626636 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit: BPF prog-id=107 op=LOAD May 14 00:32:19.329000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164626263303766343062303038646635316431333933643336626636 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit: BPF prog-id=108 op=LOAD May 14 00:32:19.329000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164626263303766343062303038646635316431333933643336626636 May 14 00:32:19.329000 audit: BPF prog-id=108 op=UNLOAD May 14 00:32:19.329000 audit: BPF prog-id=107 op=UNLOAD May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.329000 audit: BPF prog-id=109 op=LOAD May 14 00:32:19.329000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164626263303766343062303038646635316431333933643336626636 May 14 00:32:19.340930 env[1215]: time="2025-05-14T00:32:19.340858158Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-b7smw,Uid:5590f9e4-a66a-47e3-aa77-66d33e9959a2,Namespace:kube-system,Attempt:0,} returns sandbox id \"1dbbc07f40b008df51d1393d36bf6c4c53f1e66152853b0dc9cacc3e44280182\"" May 14 00:32:19.341977 kubelet[2059]: E0514 00:32:19.341656 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:19.344699 env[1215]: time="2025-05-14T00:32:19.344664402Z" level=info msg="CreateContainer within sandbox \"1dbbc07f40b008df51d1393d36bf6c4c53f1e66152853b0dc9cacc3e44280182\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 14 00:32:19.356646 env[1215]: time="2025-05-14T00:32:19.356590012Z" level=info msg="CreateContainer within sandbox \"1dbbc07f40b008df51d1393d36bf6c4c53f1e66152853b0dc9cacc3e44280182\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"796e3de3cf56a6f8fb5893f3eecd1fe6888a66bde7ad5d7258e822bafa76b8a8\"" May 14 00:32:19.357214 env[1215]: time="2025-05-14T00:32:19.357158327Z" level=info msg="StartContainer for \"796e3de3cf56a6f8fb5893f3eecd1fe6888a66bde7ad5d7258e822bafa76b8a8\"" May 14 00:32:19.371812 systemd[1]: Started cri-containerd-796e3de3cf56a6f8fb5893f3eecd1fe6888a66bde7ad5d7258e822bafa76b8a8.scope. May 14 00:32:19.397000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.397000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2168 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739366533646533636635366136663866623538393366336565636431 May 14 00:32:19.397000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.397000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.397000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.397000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.397000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.397000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.397000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.397000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.397000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.397000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.397000 audit: BPF prog-id=110 op=LOAD May 14 00:32:19.397000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2168 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739366533646533636635366136663866623538393366336565636431 May 14 00:32:19.398000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.398000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.398000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.398000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.398000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.398000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.398000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.398000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.398000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.398000 audit: BPF prog-id=111 op=LOAD May 14 00:32:19.398000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2168 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739366533646533636635366136663866623538393366336565636431 May 14 00:32:19.399000 audit: BPF prog-id=111 op=UNLOAD May 14 00:32:19.399000 audit: BPF prog-id=110 op=UNLOAD May 14 00:32:19.399000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.399000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.399000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.399000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.399000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.399000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.399000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.399000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.399000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.399000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.399000 audit: BPF prog-id=112 op=LOAD May 14 00:32:19.399000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2168 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739366533646533636635366136663866623538393366336565636431 May 14 00:32:19.414282 env[1215]: time="2025-05-14T00:32:19.414242678Z" level=info msg="StartContainer for \"796e3de3cf56a6f8fb5893f3eecd1fe6888a66bde7ad5d7258e822bafa76b8a8\" returns successfully" May 14 00:32:19.429755 env[1215]: time="2025-05-14T00:32:19.429717535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-6dfpf,Uid:7f169e96-70fe-4fb2-9f20-3302de9a132a,Namespace:tigera-operator,Attempt:0,}" May 14 00:32:19.444580 env[1215]: time="2025-05-14T00:32:19.444217600Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:32:19.444580 env[1215]: time="2025-05-14T00:32:19.444254680Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:32:19.444580 env[1215]: time="2025-05-14T00:32:19.444265240Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:32:19.444580 env[1215]: time="2025-05-14T00:32:19.444421719Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4556480e10e40ad3a0b1e46a8991ed1a28f2c5b5c80158462338cf43e554f008 pid=2246 runtime=io.containerd.runc.v2 May 14 00:32:19.459937 systemd[1]: Started cri-containerd-4556480e10e40ad3a0b1e46a8991ed1a28f2c5b5c80158462338cf43e554f008.scope. May 14 00:32:19.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit: BPF prog-id=113 op=LOAD May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2246 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353634383065313065343061643361306231653436613839393165 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2246 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353634383065313065343061643361306231653436613839393165 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit: BPF prog-id=114 op=LOAD May 14 00:32:19.474000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2246 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353634383065313065343061643361306231653436613839393165 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit: BPF prog-id=115 op=LOAD May 14 00:32:19.474000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2246 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353634383065313065343061643361306231653436613839393165 May 14 00:32:19.474000 audit: BPF prog-id=115 op=UNLOAD May 14 00:32:19.474000 audit: BPF prog-id=114 op=UNLOAD May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:19.474000 audit: BPF prog-id=116 op=LOAD May 14 00:32:19.474000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2246 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353634383065313065343061643361306231653436613839393165 May 14 00:32:19.497266 env[1215]: time="2025-05-14T00:32:19.497229149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-6dfpf,Uid:7f169e96-70fe-4fb2-9f20-3302de9a132a,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"4556480e10e40ad3a0b1e46a8991ed1a28f2c5b5c80158462338cf43e554f008\"" May 14 00:32:19.501109 env[1215]: time="2025-05-14T00:32:19.500010484Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 14 00:32:19.545000 audit[2306]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.545000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe797c020 a2=0 a3=1 items=0 ppid=2221 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 14 00:32:19.546000 audit[2307]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.546000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6127390 a2=0 a3=1 items=0 ppid=2221 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 14 00:32:19.548000 audit[2308]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.548000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5dbb010 a2=0 a3=1 items=0 ppid=2221 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.548000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 14 00:32:19.551000 audit[2309]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.551000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffefdc6300 a2=0 a3=1 items=0 ppid=2221 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 14 00:32:19.553000 audit[2310]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.553000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5f9e620 a2=0 a3=1 items=0 ppid=2221 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 14 00:32:19.553000 audit[2312]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.553000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff7ac0130 a2=0 a3=1 items=0 ppid=2221 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 14 00:32:19.647000 audit[2313]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.647000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe32e0f30 a2=0 a3=1 items=0 ppid=2221 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 14 00:32:19.649000 audit[2315]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.649000 audit[2315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdca82f80 a2=0 a3=1 items=0 ppid=2221 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.649000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 14 00:32:19.654000 audit[2318]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.654000 audit[2318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcab4b3c0 a2=0 a3=1 items=0 ppid=2221 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 14 00:32:19.655000 audit[2319]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.655000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffefd27c70 a2=0 a3=1 items=0 ppid=2221 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 14 00:32:19.658000 audit[2321]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.658000 audit[2321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc6df6a70 a2=0 a3=1 items=0 ppid=2221 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 14 00:32:19.659000 audit[2322]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.659000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7c1f740 a2=0 a3=1 items=0 ppid=2221 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.659000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 14 00:32:19.661000 audit[2324]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.661000 audit[2324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffd8de610 a2=0 a3=1 items=0 ppid=2221 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 14 00:32:19.665000 audit[2327]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.665000 audit[2327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffeaf5f750 a2=0 a3=1 items=0 ppid=2221 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 14 00:32:19.666000 audit[2328]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.666000 audit[2328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6572950 a2=0 a3=1 items=0 ppid=2221 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 14 00:32:19.668000 audit[2330]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.668000 audit[2330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe6a85840 a2=0 a3=1 items=0 ppid=2221 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 14 00:32:19.669000 audit[2331]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.669000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb268970 a2=0 a3=1 items=0 ppid=2221 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 14 00:32:19.672000 audit[2333]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.672000 audit[2333]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc4227a70 a2=0 a3=1 items=0 ppid=2221 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.672000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:32:19.675000 audit[2336]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.675000 audit[2336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcaa95800 a2=0 a3=1 items=0 ppid=2221 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:32:19.679000 audit[2339]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.679000 audit[2339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3c99cc0 a2=0 a3=1 items=0 ppid=2221 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 14 00:32:19.680000 audit[2340]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.680000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff0327320 a2=0 a3=1 items=0 ppid=2221 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 14 00:32:19.682000 audit[2342]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.682000 audit[2342]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffda05aa80 a2=0 a3=1 items=0 ppid=2221 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:32:19.686000 audit[2345]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.686000 audit[2345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd7103320 a2=0 a3=1 items=0 ppid=2221 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.686000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:32:19.687000 audit[2346]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.687000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe11ea480 a2=0 a3=1 items=0 ppid=2221 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.687000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 14 00:32:19.689000 audit[2348]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:32:19.689000 audit[2348]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff97c1740 a2=0 a3=1 items=0 ppid=2221 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.689000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 14 00:32:19.709000 audit[2354]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:19.709000 audit[2354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffd0620260 a2=0 a3=1 items=0 ppid=2221 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:19.720000 audit[2354]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:19.720000 audit[2354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffd0620260 a2=0 a3=1 items=0 ppid=2221 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.720000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:19.721000 audit[2359]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.721000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffce165f30 a2=0 a3=1 items=0 ppid=2221 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.721000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 14 00:32:19.723000 audit[2361]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.723000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffbb0ae50 a2=0 a3=1 items=0 ppid=2221 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.723000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 14 00:32:19.726000 audit[2364]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.726000 audit[2364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd30dff90 a2=0 a3=1 items=0 ppid=2221 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 14 00:32:19.727000 audit[2365]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.727000 audit[2365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff4818b0 a2=0 a3=1 items=0 ppid=2221 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 14 00:32:19.729000 audit[2367]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.729000 audit[2367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff715dfc0 a2=0 a3=1 items=0 ppid=2221 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 14 00:32:19.731000 audit[2368]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.731000 audit[2368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1b9afb0 a2=0 a3=1 items=0 ppid=2221 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 14 00:32:19.734000 audit[2370]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.734000 audit[2370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe5a8ca90 a2=0 a3=1 items=0 ppid=2221 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 14 00:32:19.737000 audit[2373]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.737000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffdc86d8a0 a2=0 a3=1 items=0 ppid=2221 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 14 00:32:19.738000 audit[2374]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.738000 audit[2374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec727f40 a2=0 a3=1 items=0 ppid=2221 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 14 00:32:19.740000 audit[2376]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.740000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffaaddfd0 a2=0 a3=1 items=0 ppid=2221 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 14 00:32:19.741000 audit[2377]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.741000 audit[2377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd96c5440 a2=0 a3=1 items=0 ppid=2221 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 14 00:32:19.744000 audit[2379]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.744000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffecce08e0 a2=0 a3=1 items=0 ppid=2221 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:32:19.747000 audit[2382]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.747000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeebd68d0 a2=0 a3=1 items=0 ppid=2221 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 14 00:32:19.751000 audit[2385]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.751000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcdeab900 a2=0 a3=1 items=0 ppid=2221 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 14 00:32:19.752000 audit[2386]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.752000 audit[2386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc1c9e4e0 a2=0 a3=1 items=0 ppid=2221 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 14 00:32:19.754000 audit[2388]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.754000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcbd27950 a2=0 a3=1 items=0 ppid=2221 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:32:19.757000 audit[2391]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.757000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffcf7af180 a2=0 a3=1 items=0 ppid=2221 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:32:19.758000 audit[2392]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.758000 audit[2392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda6dcca0 a2=0 a3=1 items=0 ppid=2221 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 14 00:32:19.760000 audit[2394]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.760000 audit[2394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc92003c0 a2=0 a3=1 items=0 ppid=2221 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.760000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 14 00:32:19.762000 audit[2395]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.762000 audit[2395]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf3da2b0 a2=0 a3=1 items=0 ppid=2221 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 14 00:32:19.764000 audit[2397]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.764000 audit[2397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc3198030 a2=0 a3=1 items=0 ppid=2221 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:32:19.768000 audit[2400]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:32:19.768000 audit[2400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd5aedbe0 a2=0 a3=1 items=0 ppid=2221 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:32:19.771000 audit[2402]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 14 00:32:19.771000 audit[2402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffcf91c820 a2=0 a3=1 items=0 ppid=2221 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.771000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:19.771000 audit[2402]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 14 00:32:19.771000 audit[2402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffcf91c820 a2=0 a3=1 items=0 ppid=2221 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:19.771000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:19.921616 kubelet[2059]: E0514 00:32:19.921549 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:20.997216 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3181502335.mount: Deactivated successfully. May 14 00:32:21.534858 env[1215]: time="2025-05-14T00:32:21.534811829Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:21.536744 env[1215]: time="2025-05-14T00:32:21.536703054Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:21.538871 env[1215]: time="2025-05-14T00:32:21.538840716Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:21.540530 env[1215]: time="2025-05-14T00:32:21.540503701Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:21.541061 env[1215]: time="2025-05-14T00:32:21.541034577Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 14 00:32:21.543214 env[1215]: time="2025-05-14T00:32:21.543169559Z" level=info msg="CreateContainer within sandbox \"4556480e10e40ad3a0b1e46a8991ed1a28f2c5b5c80158462338cf43e554f008\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 14 00:32:21.551883 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount125354009.mount: Deactivated successfully. May 14 00:32:21.554285 env[1215]: time="2025-05-14T00:32:21.554247826Z" level=info msg="CreateContainer within sandbox \"4556480e10e40ad3a0b1e46a8991ed1a28f2c5b5c80158462338cf43e554f008\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5cf8dafea189706ac9cfff577370019790a327367111d2dd56008f73fb55b4e0\"" May 14 00:32:21.554669 env[1215]: time="2025-05-14T00:32:21.554640702Z" level=info msg="StartContainer for \"5cf8dafea189706ac9cfff577370019790a327367111d2dd56008f73fb55b4e0\"" May 14 00:32:21.571360 systemd[1]: run-containerd-runc-k8s.io-5cf8dafea189706ac9cfff577370019790a327367111d2dd56008f73fb55b4e0-runc.G7C1pd.mount: Deactivated successfully. May 14 00:32:21.573750 systemd[1]: Started cri-containerd-5cf8dafea189706ac9cfff577370019790a327367111d2dd56008f73fb55b4e0.scope. May 14 00:32:21.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606644 kernel: kauditd_printk_skb: 315 callbacks suppressed May 14 00:32:21.606688 kernel: audit: type=1400 audit(1747182741.604:917): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.611358 kernel: audit: type=1400 audit(1747182741.604:918): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.611418 kernel: audit: type=1400 audit(1747182741.604:919): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.613822 kernel: audit: type=1400 audit(1747182741.604:920): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.618548 kernel: audit: type=1400 audit(1747182741.604:921): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.618628 kernel: audit: type=1400 audit(1747182741.604:922): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.623240 kernel: audit: type=1400 audit(1747182741.604:923): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.626053 kernel: audit: type=1400 audit(1747182741.604:924): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.626131 kernel: audit: type=1400 audit(1747182741.604:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.628387 kernel: audit: type=1400 audit(1747182741.605:926): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.605000 audit: BPF prog-id=117 op=LOAD May 14 00:32:21.606000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit[2411]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2246 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:21.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563663864616665613138393730366163396366666635373733373030 May 14 00:32:21.606000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit[2411]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2246 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:21.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563663864616665613138393730366163396366666635373733373030 May 14 00:32:21.606000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.606000 audit: BPF prog-id=118 op=LOAD May 14 00:32:21.606000 audit[2411]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2246 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:21.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563663864616665613138393730366163396366666635373733373030 May 14 00:32:21.608000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.608000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.608000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.608000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.608000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.608000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.608000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.608000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.608000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.608000 audit: BPF prog-id=119 op=LOAD May 14 00:32:21.608000 audit[2411]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2246 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:21.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563663864616665613138393730366163396366666635373733373030 May 14 00:32:21.610000 audit: BPF prog-id=119 op=UNLOAD May 14 00:32:21.610000 audit: BPF prog-id=118 op=UNLOAD May 14 00:32:21.610000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.610000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.610000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.610000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.610000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.610000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.610000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.610000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.610000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.610000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:21.610000 audit: BPF prog-id=120 op=LOAD May 14 00:32:21.610000 audit[2411]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2246 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:21.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563663864616665613138393730366163396366666635373733373030 May 14 00:32:21.634977 env[1215]: time="2025-05-14T00:32:21.634939385Z" level=info msg="StartContainer for \"5cf8dafea189706ac9cfff577370019790a327367111d2dd56008f73fb55b4e0\" returns successfully" May 14 00:32:21.896269 kubelet[2059]: I0514 00:32:21.896194 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-b7smw" podStartSLOduration=3.896178823 podStartE2EDuration="3.896178823s" podCreationTimestamp="2025-05-14 00:32:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:32:19.930595376 +0000 UTC m=+18.148051427" watchObservedRunningTime="2025-05-14 00:32:21.896178823 +0000 UTC m=+20.113634874" May 14 00:32:21.932996 kubelet[2059]: I0514 00:32:21.932940 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-6dfpf" podStartSLOduration=0.889192604 podStartE2EDuration="2.932925633s" podCreationTimestamp="2025-05-14 00:32:19 +0000 UTC" firstStartedPulling="2025-05-14 00:32:19.498314419 +0000 UTC m=+17.715770470" lastFinishedPulling="2025-05-14 00:32:21.542047448 +0000 UTC m=+19.759503499" observedRunningTime="2025-05-14 00:32:21.932813194 +0000 UTC m=+20.150269245" watchObservedRunningTime="2025-05-14 00:32:21.932925633 +0000 UTC m=+20.150381684" May 14 00:32:24.923000 audit[2444]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:24.923000 audit[2444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffcc5b0660 a2=0 a3=1 items=0 ppid=2221 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:24.923000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:24.931000 audit[2444]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:24.931000 audit[2444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffcc5b0660 a2=0 a3=1 items=0 ppid=2221 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:24.931000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:24.940000 audit[2446]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:24.940000 audit[2446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff3b3d880 a2=0 a3=1 items=0 ppid=2221 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:24.940000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:24.951000 audit[2446]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:24.951000 audit[2446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff3b3d880 a2=0 a3=1 items=0 ppid=2221 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:24.951000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:25.052940 kubelet[2059]: I0514 00:32:25.052876 2059 topology_manager.go:215] "Topology Admit Handler" podUID="f111f8aa-7600-42f5-8251-3c321313f97d" podNamespace="calico-system" podName="calico-typha-5df865d4bd-548gf" May 14 00:32:25.061009 systemd[1]: Created slice kubepods-besteffort-podf111f8aa_7600_42f5_8251_3c321313f97d.slice. May 14 00:32:25.102332 kubelet[2059]: I0514 00:32:25.102281 2059 topology_manager.go:215] "Topology Admit Handler" podUID="ac35a25b-aa3d-482e-95ae-7f78baa25a74" podNamespace="calico-system" podName="calico-node-f8kdv" May 14 00:32:25.107919 systemd[1]: Created slice kubepods-besteffort-podac35a25b_aa3d_482e_95ae_7f78baa25a74.slice. May 14 00:32:25.128096 kubelet[2059]: I0514 00:32:25.128067 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ac35a25b-aa3d-482e-95ae-7f78baa25a74-cni-bin-dir\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.128232 kubelet[2059]: I0514 00:32:25.128105 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c7fq5\" (UniqueName: \"kubernetes.io/projected/f111f8aa-7600-42f5-8251-3c321313f97d-kube-api-access-c7fq5\") pod \"calico-typha-5df865d4bd-548gf\" (UID: \"f111f8aa-7600-42f5-8251-3c321313f97d\") " pod="calico-system/calico-typha-5df865d4bd-548gf" May 14 00:32:25.128232 kubelet[2059]: I0514 00:32:25.128129 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f111f8aa-7600-42f5-8251-3c321313f97d-typha-certs\") pod \"calico-typha-5df865d4bd-548gf\" (UID: \"f111f8aa-7600-42f5-8251-3c321313f97d\") " pod="calico-system/calico-typha-5df865d4bd-548gf" May 14 00:32:25.128232 kubelet[2059]: I0514 00:32:25.128153 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r9546\" (UniqueName: \"kubernetes.io/projected/ac35a25b-aa3d-482e-95ae-7f78baa25a74-kube-api-access-r9546\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.128232 kubelet[2059]: I0514 00:32:25.128172 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ac35a25b-aa3d-482e-95ae-7f78baa25a74-var-run-calico\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.128232 kubelet[2059]: I0514 00:32:25.128187 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ac35a25b-aa3d-482e-95ae-7f78baa25a74-var-lib-calico\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.128373 kubelet[2059]: I0514 00:32:25.128202 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ac35a25b-aa3d-482e-95ae-7f78baa25a74-flexvol-driver-host\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.128373 kubelet[2059]: I0514 00:32:25.128217 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ac35a25b-aa3d-482e-95ae-7f78baa25a74-lib-modules\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.128373 kubelet[2059]: I0514 00:32:25.128234 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ac35a25b-aa3d-482e-95ae-7f78baa25a74-tigera-ca-bundle\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.128373 kubelet[2059]: I0514 00:32:25.128249 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ac35a25b-aa3d-482e-95ae-7f78baa25a74-policysync\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.128373 kubelet[2059]: I0514 00:32:25.128263 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ac35a25b-aa3d-482e-95ae-7f78baa25a74-cni-log-dir\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.128484 kubelet[2059]: I0514 00:32:25.128278 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ac35a25b-aa3d-482e-95ae-7f78baa25a74-node-certs\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.128484 kubelet[2059]: I0514 00:32:25.128304 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f111f8aa-7600-42f5-8251-3c321313f97d-tigera-ca-bundle\") pod \"calico-typha-5df865d4bd-548gf\" (UID: \"f111f8aa-7600-42f5-8251-3c321313f97d\") " pod="calico-system/calico-typha-5df865d4bd-548gf" May 14 00:32:25.128484 kubelet[2059]: I0514 00:32:25.128321 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ac35a25b-aa3d-482e-95ae-7f78baa25a74-cni-net-dir\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.128484 kubelet[2059]: I0514 00:32:25.128335 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ac35a25b-aa3d-482e-95ae-7f78baa25a74-xtables-lock\") pod \"calico-node-f8kdv\" (UID: \"ac35a25b-aa3d-482e-95ae-7f78baa25a74\") " pod="calico-system/calico-node-f8kdv" May 14 00:32:25.212795 kubelet[2059]: I0514 00:32:25.212669 2059 topology_manager.go:215] "Topology Admit Handler" podUID="3e285113-a129-4a13-ae7d-6cc2fd3ed9b8" podNamespace="calico-system" podName="csi-node-driver-95cpg" May 14 00:32:25.213238 kubelet[2059]: E0514 00:32:25.213212 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-95cpg" podUID="3e285113-a129-4a13-ae7d-6cc2fd3ed9b8" May 14 00:32:25.229325 kubelet[2059]: I0514 00:32:25.229282 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/3e285113-a129-4a13-ae7d-6cc2fd3ed9b8-varrun\") pod \"csi-node-driver-95cpg\" (UID: \"3e285113-a129-4a13-ae7d-6cc2fd3ed9b8\") " pod="calico-system/csi-node-driver-95cpg" May 14 00:32:25.229449 kubelet[2059]: I0514 00:32:25.229334 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/3e285113-a129-4a13-ae7d-6cc2fd3ed9b8-socket-dir\") pod \"csi-node-driver-95cpg\" (UID: \"3e285113-a129-4a13-ae7d-6cc2fd3ed9b8\") " pod="calico-system/csi-node-driver-95cpg" May 14 00:32:25.229449 kubelet[2059]: I0514 00:32:25.229353 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/3e285113-a129-4a13-ae7d-6cc2fd3ed9b8-kubelet-dir\") pod \"csi-node-driver-95cpg\" (UID: \"3e285113-a129-4a13-ae7d-6cc2fd3ed9b8\") " pod="calico-system/csi-node-driver-95cpg" May 14 00:32:25.229516 kubelet[2059]: I0514 00:32:25.229495 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t5vgn\" (UniqueName: \"kubernetes.io/projected/3e285113-a129-4a13-ae7d-6cc2fd3ed9b8-kube-api-access-t5vgn\") pod \"csi-node-driver-95cpg\" (UID: \"3e285113-a129-4a13-ae7d-6cc2fd3ed9b8\") " pod="calico-system/csi-node-driver-95cpg" May 14 00:32:25.229578 kubelet[2059]: I0514 00:32:25.229556 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/3e285113-a129-4a13-ae7d-6cc2fd3ed9b8-registration-dir\") pod \"csi-node-driver-95cpg\" (UID: \"3e285113-a129-4a13-ae7d-6cc2fd3ed9b8\") " pod="calico-system/csi-node-driver-95cpg" May 14 00:32:25.230168 kubelet[2059]: E0514 00:32:25.230150 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.230302 kubelet[2059]: W0514 00:32:25.230265 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.230393 kubelet[2059]: E0514 00:32:25.230379 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.230700 kubelet[2059]: E0514 00:32:25.230675 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.230700 kubelet[2059]: W0514 00:32:25.230690 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.230822 kubelet[2059]: E0514 00:32:25.230721 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.231045 kubelet[2059]: E0514 00:32:25.231021 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.231045 kubelet[2059]: W0514 00:32:25.231040 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.231141 kubelet[2059]: E0514 00:32:25.231101 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.235533 kubelet[2059]: E0514 00:32:25.235503 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.235533 kubelet[2059]: W0514 00:32:25.235525 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.235636 kubelet[2059]: E0514 00:32:25.235542 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.236108 kubelet[2059]: E0514 00:32:25.236084 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.236108 kubelet[2059]: W0514 00:32:25.236101 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.236325 kubelet[2059]: E0514 00:32:25.236304 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.237361 kubelet[2059]: E0514 00:32:25.237333 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.237361 kubelet[2059]: W0514 00:32:25.237349 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.237468 kubelet[2059]: E0514 00:32:25.237420 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.237531 kubelet[2059]: E0514 00:32:25.237513 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.237531 kubelet[2059]: W0514 00:32:25.237523 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.237644 kubelet[2059]: E0514 00:32:25.237624 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.237854 kubelet[2059]: E0514 00:32:25.237829 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.237854 kubelet[2059]: W0514 00:32:25.237847 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.237986 kubelet[2059]: E0514 00:32:25.237971 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.238133 kubelet[2059]: E0514 00:32:25.238101 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.238133 kubelet[2059]: W0514 00:32:25.238117 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.238250 kubelet[2059]: E0514 00:32:25.238235 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.238977 kubelet[2059]: E0514 00:32:25.238948 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.238977 kubelet[2059]: W0514 00:32:25.238967 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.239124 kubelet[2059]: E0514 00:32:25.239107 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.239186 kubelet[2059]: E0514 00:32:25.239123 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.239255 kubelet[2059]: W0514 00:32:25.239241 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.239406 kubelet[2059]: E0514 00:32:25.239392 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.239877 kubelet[2059]: E0514 00:32:25.239863 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.239975 kubelet[2059]: W0514 00:32:25.239961 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.240205 kubelet[2059]: E0514 00:32:25.240191 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.240293 kubelet[2059]: W0514 00:32:25.240272 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.240527 kubelet[2059]: E0514 00:32:25.240514 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.240598 kubelet[2059]: W0514 00:32:25.240586 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.240762 kubelet[2059]: E0514 00:32:25.240738 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.240851 kubelet[2059]: E0514 00:32:25.240744 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.240900 kubelet[2059]: E0514 00:32:25.240753 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.241033 kubelet[2059]: E0514 00:32:25.241021 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.241120 kubelet[2059]: W0514 00:32:25.241107 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.241246 kubelet[2059]: E0514 00:32:25.241222 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.241396 kubelet[2059]: E0514 00:32:25.241383 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.241467 kubelet[2059]: W0514 00:32:25.241455 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.241585 kubelet[2059]: E0514 00:32:25.241569 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.242113 kubelet[2059]: E0514 00:32:25.242089 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.242223 kubelet[2059]: W0514 00:32:25.242208 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.242396 kubelet[2059]: E0514 00:32:25.242371 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.242513 kubelet[2059]: E0514 00:32:25.242501 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.242573 kubelet[2059]: W0514 00:32:25.242561 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.242710 kubelet[2059]: E0514 00:32:25.242632 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.242837 kubelet[2059]: E0514 00:32:25.242825 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.242968 kubelet[2059]: W0514 00:32:25.242954 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.243065 kubelet[2059]: E0514 00:32:25.243046 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.243274 kubelet[2059]: E0514 00:32:25.243262 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.243365 kubelet[2059]: W0514 00:32:25.243351 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.243510 kubelet[2059]: E0514 00:32:25.243496 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.248093 kubelet[2059]: E0514 00:32:25.245878 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.248093 kubelet[2059]: W0514 00:32:25.245898 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.248093 kubelet[2059]: E0514 00:32:25.245939 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.248093 kubelet[2059]: E0514 00:32:25.246098 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.248093 kubelet[2059]: W0514 00:32:25.246107 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.248093 kubelet[2059]: E0514 00:32:25.246169 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.249180 kubelet[2059]: E0514 00:32:25.249155 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.249180 kubelet[2059]: W0514 00:32:25.249174 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.249357 kubelet[2059]: E0514 00:32:25.249338 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.249433 kubelet[2059]: E0514 00:32:25.249375 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.249497 kubelet[2059]: W0514 00:32:25.249484 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.249613 kubelet[2059]: E0514 00:32:25.249588 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.249770 kubelet[2059]: E0514 00:32:25.249758 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.249896 kubelet[2059]: W0514 00:32:25.249875 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.250282 kubelet[2059]: E0514 00:32:25.250266 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.250386 kubelet[2059]: W0514 00:32:25.250364 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.250647 kubelet[2059]: E0514 00:32:25.250633 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.250727 kubelet[2059]: W0514 00:32:25.250714 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.250994 kubelet[2059]: E0514 00:32:25.250981 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.251084 kubelet[2059]: W0514 00:32:25.251070 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.251322 kubelet[2059]: E0514 00:32:25.251308 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.251402 kubelet[2059]: W0514 00:32:25.251389 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.251876 kubelet[2059]: E0514 00:32:25.251853 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.251957 kubelet[2059]: E0514 00:32:25.251888 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.252004 kubelet[2059]: E0514 00:32:25.251900 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.252128 kubelet[2059]: E0514 00:32:25.251905 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.252211 kubelet[2059]: E0514 00:32:25.251912 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.252498 kubelet[2059]: E0514 00:32:25.252303 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.252554 kubelet[2059]: W0514 00:32:25.252500 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.252651 kubelet[2059]: E0514 00:32:25.252635 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.252899 kubelet[2059]: E0514 00:32:25.252687 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.253013 kubelet[2059]: W0514 00:32:25.252997 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.253099 kubelet[2059]: E0514 00:32:25.253079 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.254026 kubelet[2059]: E0514 00:32:25.254009 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.254721 kubelet[2059]: W0514 00:32:25.254175 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.256026 kubelet[2059]: E0514 00:32:25.256009 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.256864 kubelet[2059]: E0514 00:32:25.256847 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.256997 kubelet[2059]: W0514 00:32:25.256985 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.257146 kubelet[2059]: E0514 00:32:25.257133 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.257316 kubelet[2059]: E0514 00:32:25.257266 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.257408 kubelet[2059]: W0514 00:32:25.257397 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.257589 kubelet[2059]: E0514 00:32:25.257574 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.257720 kubelet[2059]: E0514 00:32:25.257710 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.257806 kubelet[2059]: W0514 00:32:25.257771 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.257993 kubelet[2059]: E0514 00:32:25.257980 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.261627 kubelet[2059]: E0514 00:32:25.261611 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.261716 kubelet[2059]: W0514 00:32:25.261703 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.261909 kubelet[2059]: E0514 00:32:25.261895 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.262060 kubelet[2059]: E0514 00:32:25.262049 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.262138 kubelet[2059]: W0514 00:32:25.262126 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.262306 kubelet[2059]: E0514 00:32:25.262283 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.262443 kubelet[2059]: E0514 00:32:25.262433 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.262508 kubelet[2059]: W0514 00:32:25.262496 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.262656 kubelet[2059]: E0514 00:32:25.262644 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.262809 kubelet[2059]: E0514 00:32:25.262797 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.262874 kubelet[2059]: W0514 00:32:25.262862 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.263022 kubelet[2059]: E0514 00:32:25.263010 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.263355 kubelet[2059]: E0514 00:32:25.263342 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.263438 kubelet[2059]: W0514 00:32:25.263426 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.263501 kubelet[2059]: E0514 00:32:25.263490 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.275540 kubelet[2059]: E0514 00:32:25.275518 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.275685 kubelet[2059]: W0514 00:32:25.275671 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.275748 kubelet[2059]: E0514 00:32:25.275736 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.330626 kubelet[2059]: E0514 00:32:25.330597 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.330818 kubelet[2059]: W0514 00:32:25.330799 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.330889 kubelet[2059]: E0514 00:32:25.330876 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.331200 kubelet[2059]: E0514 00:32:25.331186 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.331281 kubelet[2059]: W0514 00:32:25.331268 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.331355 kubelet[2059]: E0514 00:32:25.331344 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.331605 kubelet[2059]: E0514 00:32:25.331591 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.331690 kubelet[2059]: W0514 00:32:25.331676 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.331751 kubelet[2059]: E0514 00:32:25.331740 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.332016 kubelet[2059]: E0514 00:32:25.332002 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.332099 kubelet[2059]: W0514 00:32:25.332085 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.332159 kubelet[2059]: E0514 00:32:25.332148 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.332405 kubelet[2059]: E0514 00:32:25.332391 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.332482 kubelet[2059]: W0514 00:32:25.332469 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.332538 kubelet[2059]: E0514 00:32:25.332528 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.332798 kubelet[2059]: E0514 00:32:25.332785 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.332884 kubelet[2059]: W0514 00:32:25.332870 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.332998 kubelet[2059]: E0514 00:32:25.332971 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.333161 kubelet[2059]: E0514 00:32:25.333148 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.333223 kubelet[2059]: W0514 00:32:25.333211 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.333338 kubelet[2059]: E0514 00:32:25.333319 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.333610 kubelet[2059]: E0514 00:32:25.333595 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.333685 kubelet[2059]: W0514 00:32:25.333674 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.333800 kubelet[2059]: E0514 00:32:25.333781 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.333987 kubelet[2059]: E0514 00:32:25.333974 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.334059 kubelet[2059]: W0514 00:32:25.334047 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.334161 kubelet[2059]: E0514 00:32:25.334142 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.334344 kubelet[2059]: E0514 00:32:25.334331 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.334407 kubelet[2059]: W0514 00:32:25.334395 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.334513 kubelet[2059]: E0514 00:32:25.334495 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.334678 kubelet[2059]: E0514 00:32:25.334665 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.334746 kubelet[2059]: W0514 00:32:25.334733 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.334870 kubelet[2059]: E0514 00:32:25.334852 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.335098 kubelet[2059]: E0514 00:32:25.335084 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.335164 kubelet[2059]: W0514 00:32:25.335152 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.335272 kubelet[2059]: E0514 00:32:25.335252 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.335445 kubelet[2059]: E0514 00:32:25.335432 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.335514 kubelet[2059]: W0514 00:32:25.335502 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.335608 kubelet[2059]: E0514 00:32:25.335592 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.335798 kubelet[2059]: E0514 00:32:25.335769 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.335877 kubelet[2059]: W0514 00:32:25.335864 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.335979 kubelet[2059]: E0514 00:32:25.335962 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.336143 kubelet[2059]: E0514 00:32:25.336130 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.336205 kubelet[2059]: W0514 00:32:25.336194 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.336314 kubelet[2059]: E0514 00:32:25.336296 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.336518 kubelet[2059]: E0514 00:32:25.336504 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.336595 kubelet[2059]: W0514 00:32:25.336582 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.336695 kubelet[2059]: E0514 00:32:25.336677 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.336881 kubelet[2059]: E0514 00:32:25.336869 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.336948 kubelet[2059]: W0514 00:32:25.336936 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.337063 kubelet[2059]: E0514 00:32:25.337043 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.337242 kubelet[2059]: E0514 00:32:25.337229 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.337315 kubelet[2059]: W0514 00:32:25.337303 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.337417 kubelet[2059]: E0514 00:32:25.337399 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.337586 kubelet[2059]: E0514 00:32:25.337574 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.337650 kubelet[2059]: W0514 00:32:25.337639 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.337807 kubelet[2059]: E0514 00:32:25.337793 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.337941 kubelet[2059]: E0514 00:32:25.337930 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.338009 kubelet[2059]: W0514 00:32:25.337998 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.338142 kubelet[2059]: E0514 00:32:25.338127 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.338376 kubelet[2059]: E0514 00:32:25.338365 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.338458 kubelet[2059]: W0514 00:32:25.338446 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.338629 kubelet[2059]: E0514 00:32:25.338616 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.338770 kubelet[2059]: E0514 00:32:25.338759 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.338850 kubelet[2059]: W0514 00:32:25.338838 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.338987 kubelet[2059]: E0514 00:32:25.338957 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.339160 kubelet[2059]: E0514 00:32:25.339148 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.339233 kubelet[2059]: W0514 00:32:25.339221 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.339366 kubelet[2059]: E0514 00:32:25.339344 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.339564 kubelet[2059]: E0514 00:32:25.339551 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.339626 kubelet[2059]: W0514 00:32:25.339614 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.339686 kubelet[2059]: E0514 00:32:25.339673 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.339942 kubelet[2059]: E0514 00:32:25.339928 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.340027 kubelet[2059]: W0514 00:32:25.340013 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.340080 kubelet[2059]: E0514 00:32:25.340070 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.349027 kubelet[2059]: E0514 00:32:25.348959 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:25.349027 kubelet[2059]: W0514 00:32:25.348975 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:25.349027 kubelet[2059]: E0514 00:32:25.348987 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:25.363746 kubelet[2059]: E0514 00:32:25.363724 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:25.364444 env[1215]: time="2025-05-14T00:32:25.364184206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5df865d4bd-548gf,Uid:f111f8aa-7600-42f5-8251-3c321313f97d,Namespace:calico-system,Attempt:0,}" May 14 00:32:25.397279 env[1215]: time="2025-05-14T00:32:25.397210573Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:32:25.397279 env[1215]: time="2025-05-14T00:32:25.397254573Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:32:25.397279 env[1215]: time="2025-05-14T00:32:25.397264893Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:32:25.397466 env[1215]: time="2025-05-14T00:32:25.397401572Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cc2ceb2d42eb4237fd1f1d7d2bc032c4ca0de8c4f12ab23801803bfccc47d26c pid=2526 runtime=io.containerd.runc.v2 May 14 00:32:25.408796 systemd[1]: Started cri-containerd-cc2ceb2d42eb4237fd1f1d7d2bc032c4ca0de8c4f12ab23801803bfccc47d26c.scope. May 14 00:32:25.410622 kubelet[2059]: E0514 00:32:25.410487 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:25.412538 env[1215]: time="2025-05-14T00:32:25.412490785Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f8kdv,Uid:ac35a25b-aa3d-482e-95ae-7f78baa25a74,Namespace:calico-system,Attempt:0,}" May 14 00:32:25.428993 env[1215]: time="2025-05-14T00:32:25.428808630Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:32:25.428993 env[1215]: time="2025-05-14T00:32:25.428873069Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:32:25.429104 env[1215]: time="2025-05-14T00:32:25.428988749Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:32:25.429441 env[1215]: time="2025-05-14T00:32:25.429201307Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/021a30c89a22384681e38152c1f13742b41275401f3619d407c7ff2d3bd19866 pid=2561 runtime=io.containerd.runc.v2 May 14 00:32:25.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.433000 audit: BPF prog-id=121 op=LOAD May 14 00:32:25.436000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit[2536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2526 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363326365623264343265623432333766643166316437643262633033 May 14 00:32:25.436000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit[2536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2526 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363326365623264343265623432333766643166316437643262633033 May 14 00:32:25.436000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.436000 audit: BPF prog-id=122 op=LOAD May 14 00:32:25.436000 audit[2536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2526 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363326365623264343265623432333766643166316437643262633033 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit: BPF prog-id=123 op=LOAD May 14 00:32:25.437000 audit[2536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2526 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363326365623264343265623432333766643166316437643262633033 May 14 00:32:25.437000 audit: BPF prog-id=123 op=UNLOAD May 14 00:32:25.437000 audit: BPF prog-id=122 op=UNLOAD May 14 00:32:25.437000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.437000 audit: BPF prog-id=124 op=LOAD May 14 00:32:25.437000 audit[2536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2526 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363326365623264343265623432333766643166316437643262633033 May 14 00:32:25.442966 systemd[1]: Started cri-containerd-021a30c89a22384681e38152c1f13742b41275401f3619d407c7ff2d3bd19866.scope. May 14 00:32:25.469337 env[1215]: time="2025-05-14T00:32:25.469216945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5df865d4bd-548gf,Uid:f111f8aa-7600-42f5-8251-3c321313f97d,Namespace:calico-system,Attempt:0,} returns sandbox id \"cc2ceb2d42eb4237fd1f1d7d2bc032c4ca0de8c4f12ab23801803bfccc47d26c\"" May 14 00:32:25.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit: BPF prog-id=125 op=LOAD May 14 00:32:25.469000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2561 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032316133306338396132323338343638316533383135326331663133 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2561 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032316133306338396132323338343638316533383135326331663133 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit: BPF prog-id=126 op=LOAD May 14 00:32:25.469000 audit[2571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2561 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032316133306338396132323338343638316533383135326331663133 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.469000 audit: BPF prog-id=127 op=LOAD May 14 00:32:25.469000 audit[2571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2561 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032316133306338396132323338343638316533383135326331663133 May 14 00:32:25.470000 audit: BPF prog-id=127 op=UNLOAD May 14 00:32:25.470000 audit: BPF prog-id=126 op=UNLOAD May 14 00:32:25.470000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.470000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.470000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.470000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.470000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.470000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.470000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.470000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.470000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.470000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:25.470000 audit: BPF prog-id=128 op=LOAD May 14 00:32:25.470000 audit[2571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2561 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032316133306338396132323338343638316533383135326331663133 May 14 00:32:25.472400 kubelet[2059]: E0514 00:32:25.470278 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:25.474107 env[1215]: time="2025-05-14T00:32:25.474052710Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 14 00:32:25.493574 env[1215]: time="2025-05-14T00:32:25.493533333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f8kdv,Uid:ac35a25b-aa3d-482e-95ae-7f78baa25a74,Namespace:calico-system,Attempt:0,} returns sandbox id \"021a30c89a22384681e38152c1f13742b41275401f3619d407c7ff2d3bd19866\"" May 14 00:32:25.494957 kubelet[2059]: E0514 00:32:25.494934 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:25.966000 audit[2603]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:25.966000 audit[2603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffda709730 a2=0 a3=1 items=0 ppid=2221 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.966000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:25.974000 audit[2603]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:25.974000 audit[2603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffda709730 a2=0 a3=1 items=0 ppid=2221 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:25.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:26.887192 kubelet[2059]: E0514 00:32:26.886800 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-95cpg" podUID="3e285113-a129-4a13-ae7d-6cc2fd3ed9b8" May 14 00:32:27.235294 env[1215]: time="2025-05-14T00:32:27.235173898Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:27.237178 env[1215]: time="2025-05-14T00:32:27.237141566Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:27.238719 env[1215]: time="2025-05-14T00:32:27.238691276Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:27.239941 env[1215]: time="2025-05-14T00:32:27.239916068Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:27.240510 env[1215]: time="2025-05-14T00:32:27.240479064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 14 00:32:27.242805 env[1215]: time="2025-05-14T00:32:27.242404491Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 14 00:32:27.252955 env[1215]: time="2025-05-14T00:32:27.252912223Z" level=info msg="CreateContainer within sandbox \"cc2ceb2d42eb4237fd1f1d7d2bc032c4ca0de8c4f12ab23801803bfccc47d26c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 14 00:32:27.298112 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1109759524.mount: Deactivated successfully. May 14 00:32:27.302247 env[1215]: time="2025-05-14T00:32:27.302200983Z" level=info msg="CreateContainer within sandbox \"cc2ceb2d42eb4237fd1f1d7d2bc032c4ca0de8c4f12ab23801803bfccc47d26c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"487a620553cf4cc79f9bfa7504b6ac2b5ef34f54e16a4f4f17a5395a1669985b\"" May 14 00:32:27.302739 env[1215]: time="2025-05-14T00:32:27.302634540Z" level=info msg="StartContainer for \"487a620553cf4cc79f9bfa7504b6ac2b5ef34f54e16a4f4f17a5395a1669985b\"" May 14 00:32:27.328463 systemd[1]: Started cri-containerd-487a620553cf4cc79f9bfa7504b6ac2b5ef34f54e16a4f4f17a5395a1669985b.scope. May 14 00:32:27.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.369952 kernel: kauditd_printk_skb: 179 callbacks suppressed May 14 00:32:27.370030 kernel: audit: type=1400 audit(1747182747.366:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.370056 kernel: audit: type=1400 audit(1747182747.366:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.374553 kernel: audit: type=1400 audit(1747182747.366:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.374604 kernel: audit: type=1400 audit(1747182747.366:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.379112 kernel: audit: type=1400 audit(1747182747.366:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.379157 kernel: audit: type=1400 audit(1747182747.366:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.383682 kernel: audit: type=1400 audit(1747182747.366:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.383821 kernel: audit: type=1400 audit(1747182747.366:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.388209 kernel: audit: type=1400 audit(1747182747.366:985): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.388303 kernel: audit: type=1400 audit(1747182747.366:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.366000 audit: BPF prog-id=129 op=LOAD May 14 00:32:27.367000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit[2613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2526 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:27.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438376136323035353363663463633739663962666137353034623661 May 14 00:32:27.367000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit[2613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2526 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:27.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438376136323035353363663463633739663962666137353034623661 May 14 00:32:27.367000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.367000 audit: BPF prog-id=130 op=LOAD May 14 00:32:27.367000 audit[2613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2526 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:27.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438376136323035353363663463633739663962666137353034623661 May 14 00:32:27.369000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.369000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.369000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.369000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.369000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.369000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.369000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.369000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.369000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.369000 audit: BPF prog-id=131 op=LOAD May 14 00:32:27.369000 audit[2613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2526 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:27.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438376136323035353363663463633739663962666137353034623661 May 14 00:32:27.371000 audit: BPF prog-id=131 op=UNLOAD May 14 00:32:27.371000 audit: BPF prog-id=130 op=UNLOAD May 14 00:32:27.371000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.371000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.371000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.371000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.371000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.371000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.371000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.371000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.371000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.371000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:27.371000 audit: BPF prog-id=132 op=LOAD May 14 00:32:27.371000 audit[2613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2526 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:27.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438376136323035353363663463633739663962666137353034623661 May 14 00:32:27.426359 env[1215]: time="2025-05-14T00:32:27.426300777Z" level=info msg="StartContainer for \"487a620553cf4cc79f9bfa7504b6ac2b5ef34f54e16a4f4f17a5395a1669985b\" returns successfully" May 14 00:32:27.938411 kubelet[2059]: E0514 00:32:27.938379 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:27.954142 kubelet[2059]: I0514 00:32:27.954072 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5df865d4bd-548gf" podStartSLOduration=1.186070884 podStartE2EDuration="2.953995028s" podCreationTimestamp="2025-05-14 00:32:25 +0000 UTC" firstStartedPulling="2025-05-14 00:32:25.473770792 +0000 UTC m=+23.691226803" lastFinishedPulling="2025-05-14 00:32:27.241694896 +0000 UTC m=+25.459150947" observedRunningTime="2025-05-14 00:32:27.952992515 +0000 UTC m=+26.170448526" watchObservedRunningTime="2025-05-14 00:32:27.953995028 +0000 UTC m=+26.171451079" May 14 00:32:28.037221 kubelet[2059]: E0514 00:32:28.037186 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.037221 kubelet[2059]: W0514 00:32:28.037206 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.037221 kubelet[2059]: E0514 00:32:28.037223 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.037453 kubelet[2059]: E0514 00:32:28.037430 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.037453 kubelet[2059]: W0514 00:32:28.037442 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.037453 kubelet[2059]: E0514 00:32:28.037451 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.037639 kubelet[2059]: E0514 00:32:28.037620 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.037639 kubelet[2059]: W0514 00:32:28.037631 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.037639 kubelet[2059]: E0514 00:32:28.037639 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.037806 kubelet[2059]: E0514 00:32:28.037794 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.037806 kubelet[2059]: W0514 00:32:28.037804 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.037867 kubelet[2059]: E0514 00:32:28.037812 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.037962 kubelet[2059]: E0514 00:32:28.037953 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.037992 kubelet[2059]: W0514 00:32:28.037962 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.037992 kubelet[2059]: E0514 00:32:28.037969 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.038102 kubelet[2059]: E0514 00:32:28.038093 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.038129 kubelet[2059]: W0514 00:32:28.038102 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.038129 kubelet[2059]: E0514 00:32:28.038109 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.038230 kubelet[2059]: E0514 00:32:28.038220 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.038230 kubelet[2059]: W0514 00:32:28.038229 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.038289 kubelet[2059]: E0514 00:32:28.038235 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.038373 kubelet[2059]: E0514 00:32:28.038363 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.038403 kubelet[2059]: W0514 00:32:28.038373 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.038403 kubelet[2059]: E0514 00:32:28.038381 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.038518 kubelet[2059]: E0514 00:32:28.038509 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.038545 kubelet[2059]: W0514 00:32:28.038518 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.038545 kubelet[2059]: E0514 00:32:28.038525 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.038649 kubelet[2059]: E0514 00:32:28.038640 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.038677 kubelet[2059]: W0514 00:32:28.038649 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.038677 kubelet[2059]: E0514 00:32:28.038656 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.038785 kubelet[2059]: E0514 00:32:28.038769 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.038816 kubelet[2059]: W0514 00:32:28.038790 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.038816 kubelet[2059]: E0514 00:32:28.038798 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.038928 kubelet[2059]: E0514 00:32:28.038919 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.038957 kubelet[2059]: W0514 00:32:28.038928 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.038957 kubelet[2059]: E0514 00:32:28.038936 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.039071 kubelet[2059]: E0514 00:32:28.039062 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.039102 kubelet[2059]: W0514 00:32:28.039070 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.039102 kubelet[2059]: E0514 00:32:28.039078 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.039201 kubelet[2059]: E0514 00:32:28.039192 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.039229 kubelet[2059]: W0514 00:32:28.039201 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.039229 kubelet[2059]: E0514 00:32:28.039208 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.039339 kubelet[2059]: E0514 00:32:28.039329 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.039367 kubelet[2059]: W0514 00:32:28.039338 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.039367 kubelet[2059]: E0514 00:32:28.039346 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.055652 kubelet[2059]: E0514 00:32:28.055628 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.055652 kubelet[2059]: W0514 00:32:28.055644 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.055736 kubelet[2059]: E0514 00:32:28.055657 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.055855 kubelet[2059]: E0514 00:32:28.055837 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.055855 kubelet[2059]: W0514 00:32:28.055849 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.055921 kubelet[2059]: E0514 00:32:28.055863 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.056104 kubelet[2059]: E0514 00:32:28.056082 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.056104 kubelet[2059]: W0514 00:32:28.056094 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.056177 kubelet[2059]: E0514 00:32:28.056107 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.056322 kubelet[2059]: E0514 00:32:28.056300 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.056322 kubelet[2059]: W0514 00:32:28.056311 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.056379 kubelet[2059]: E0514 00:32:28.056324 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.056485 kubelet[2059]: E0514 00:32:28.056475 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.056513 kubelet[2059]: W0514 00:32:28.056485 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.056513 kubelet[2059]: E0514 00:32:28.056494 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.056629 kubelet[2059]: E0514 00:32:28.056620 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.056655 kubelet[2059]: W0514 00:32:28.056629 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.056655 kubelet[2059]: E0514 00:32:28.056640 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.056835 kubelet[2059]: E0514 00:32:28.056822 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.056835 kubelet[2059]: W0514 00:32:28.056834 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.056905 kubelet[2059]: E0514 00:32:28.056847 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.057059 kubelet[2059]: E0514 00:32:28.057041 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.057059 kubelet[2059]: W0514 00:32:28.057057 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.057059 kubelet[2059]: E0514 00:32:28.057071 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.057206 kubelet[2059]: E0514 00:32:28.057195 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.057206 kubelet[2059]: W0514 00:32:28.057205 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.057269 kubelet[2059]: E0514 00:32:28.057215 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.057376 kubelet[2059]: E0514 00:32:28.057366 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.057376 kubelet[2059]: W0514 00:32:28.057375 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.057424 kubelet[2059]: E0514 00:32:28.057385 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.057556 kubelet[2059]: E0514 00:32:28.057547 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.057583 kubelet[2059]: W0514 00:32:28.057557 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.057583 kubelet[2059]: E0514 00:32:28.057565 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.057899 kubelet[2059]: E0514 00:32:28.057888 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.057930 kubelet[2059]: W0514 00:32:28.057900 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.057930 kubelet[2059]: E0514 00:32:28.057913 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.058068 kubelet[2059]: E0514 00:32:28.058059 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.058095 kubelet[2059]: W0514 00:32:28.058068 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.058095 kubelet[2059]: E0514 00:32:28.058079 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.058232 kubelet[2059]: E0514 00:32:28.058212 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.058232 kubelet[2059]: W0514 00:32:28.058220 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.058232 kubelet[2059]: E0514 00:32:28.058227 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.058379 kubelet[2059]: E0514 00:32:28.058367 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.058379 kubelet[2059]: W0514 00:32:28.058377 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.058433 kubelet[2059]: E0514 00:32:28.058385 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.058507 kubelet[2059]: E0514 00:32:28.058498 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.058531 kubelet[2059]: W0514 00:32:28.058507 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.058531 kubelet[2059]: E0514 00:32:28.058514 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.058655 kubelet[2059]: E0514 00:32:28.058646 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.058683 kubelet[2059]: W0514 00:32:28.058655 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.058683 kubelet[2059]: E0514 00:32:28.058663 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.058924 kubelet[2059]: E0514 00:32:28.058913 2059 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:32:28.058955 kubelet[2059]: W0514 00:32:28.058923 2059 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:32:28.058955 kubelet[2059]: E0514 00:32:28.058932 2059 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:32:28.545992 systemd[1]: Started sshd@7-10.0.0.19:22-10.0.0.1:60690.service. May 14 00:32:28.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.19:22-10.0.0.1:60690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:28.589000 audit[2680]: USER_ACCT pid=2680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:28.590366 sshd[2680]: Accepted publickey for core from 10.0.0.1 port 60690 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:32:28.590000 audit[2680]: CRED_ACQ pid=2680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:28.590000 audit[2680]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee75ec80 a2=3 a3=1 items=0 ppid=1 pid=2680 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:28.590000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:32:28.591724 sshd[2680]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:32:28.595066 systemd-logind[1202]: New session 8 of user core. May 14 00:32:28.595963 systemd[1]: Started session-8.scope. May 14 00:32:28.598000 audit[2680]: USER_START pid=2680 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:28.599000 audit[2682]: CRED_ACQ pid=2682 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:28.634565 env[1215]: time="2025-05-14T00:32:28.634520928Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:28.636204 env[1215]: time="2025-05-14T00:32:28.636174238Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:28.637658 env[1215]: time="2025-05-14T00:32:28.637623109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:28.638969 env[1215]: time="2025-05-14T00:32:28.638944461Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:28.639379 env[1215]: time="2025-05-14T00:32:28.639354698Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 14 00:32:28.642584 env[1215]: time="2025-05-14T00:32:28.642552278Z" level=info msg="CreateContainer within sandbox \"021a30c89a22384681e38152c1f13742b41275401f3619d407c7ff2d3bd19866\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 14 00:32:28.653680 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1829533761.mount: Deactivated successfully. May 14 00:32:28.659282 env[1215]: time="2025-05-14T00:32:28.659234374Z" level=info msg="CreateContainer within sandbox \"021a30c89a22384681e38152c1f13742b41275401f3619d407c7ff2d3bd19866\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3dbf15b8987bc09e9ee8c5f8dfd1ec70287c1a2b13ae29cb2773756e7b2094ac\"" May 14 00:32:28.660319 env[1215]: time="2025-05-14T00:32:28.660288688Z" level=info msg="StartContainer for \"3dbf15b8987bc09e9ee8c5f8dfd1ec70287c1a2b13ae29cb2773756e7b2094ac\"" May 14 00:32:28.683039 systemd[1]: Started cri-containerd-3dbf15b8987bc09e9ee8c5f8dfd1ec70287c1a2b13ae29cb2773756e7b2094ac.scope. May 14 00:32:28.706000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.706000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2561 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:28.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364626631356238393837626330396539656538633566386466643165 May 14 00:32:28.706000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.706000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.706000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.706000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.706000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.706000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.706000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.706000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.706000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.706000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.706000 audit: BPF prog-id=133 op=LOAD May 14 00:32:28.706000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2561 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:28.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364626631356238393837626330396539656538633566386466643165 May 14 00:32:28.707000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.707000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.707000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.707000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.707000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.707000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.707000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.707000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.707000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.707000 audit: BPF prog-id=134 op=LOAD May 14 00:32:28.707000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2561 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:28.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364626631356238393837626330396539656538633566386466643165 May 14 00:32:28.708000 audit: BPF prog-id=134 op=UNLOAD May 14 00:32:28.708000 audit: BPF prog-id=133 op=UNLOAD May 14 00:32:28.708000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.708000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.708000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.708000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.708000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.708000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.708000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.708000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.708000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.708000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:28.708000 audit: BPF prog-id=135 op=LOAD May 14 00:32:28.708000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2561 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:28.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364626631356238393837626330396539656538633566386466643165 May 14 00:32:28.725574 env[1215]: time="2025-05-14T00:32:28.724448727Z" level=info msg="StartContainer for \"3dbf15b8987bc09e9ee8c5f8dfd1ec70287c1a2b13ae29cb2773756e7b2094ac\" returns successfully" May 14 00:32:28.746588 sshd[2680]: pam_unix(sshd:session): session closed for user core May 14 00:32:28.746000 audit[2680]: USER_END pid=2680 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:28.746000 audit[2680]: CRED_DISP pid=2680 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:28.748617 systemd[1]: cri-containerd-3dbf15b8987bc09e9ee8c5f8dfd1ec70287c1a2b13ae29cb2773756e7b2094ac.scope: Deactivated successfully. May 14 00:32:28.749442 systemd[1]: sshd@7-10.0.0.19:22-10.0.0.1:60690.service: Deactivated successfully. May 14 00:32:28.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.19:22-10.0.0.1:60690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:28.750150 systemd[1]: session-8.scope: Deactivated successfully. May 14 00:32:28.750631 systemd-logind[1202]: Session 8 logged out. Waiting for processes to exit. May 14 00:32:28.752009 systemd-logind[1202]: Removed session 8. May 14 00:32:28.752000 audit: BPF prog-id=135 op=UNLOAD May 14 00:32:28.782252 env[1215]: time="2025-05-14T00:32:28.782196087Z" level=info msg="shim disconnected" id=3dbf15b8987bc09e9ee8c5f8dfd1ec70287c1a2b13ae29cb2773756e7b2094ac May 14 00:32:28.782252 env[1215]: time="2025-05-14T00:32:28.782253646Z" level=warning msg="cleaning up after shim disconnected" id=3dbf15b8987bc09e9ee8c5f8dfd1ec70287c1a2b13ae29cb2773756e7b2094ac namespace=k8s.io May 14 00:32:28.782461 env[1215]: time="2025-05-14T00:32:28.782264926Z" level=info msg="cleaning up dead shim" May 14 00:32:28.788507 env[1215]: time="2025-05-14T00:32:28.788476087Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:32:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2737 runtime=io.containerd.runc.v2\n" May 14 00:32:28.886212 kubelet[2059]: E0514 00:32:28.886174 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-95cpg" podUID="3e285113-a129-4a13-ae7d-6cc2fd3ed9b8" May 14 00:32:28.940053 kubelet[2059]: I0514 00:32:28.940023 2059 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:32:28.941747 kubelet[2059]: E0514 00:32:28.940522 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:28.941747 kubelet[2059]: E0514 00:32:28.940987 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:28.941889 env[1215]: time="2025-05-14T00:32:28.941704571Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 14 00:32:29.247806 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3dbf15b8987bc09e9ee8c5f8dfd1ec70287c1a2b13ae29cb2773756e7b2094ac-rootfs.mount: Deactivated successfully. May 14 00:32:30.886599 kubelet[2059]: E0514 00:32:30.886541 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-95cpg" podUID="3e285113-a129-4a13-ae7d-6cc2fd3ed9b8" May 14 00:32:32.429422 kubelet[2059]: I0514 00:32:32.429119 2059 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:32:32.429844 kubelet[2059]: E0514 00:32:32.429725 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:32.455000 audit[2756]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:32.456953 kernel: kauditd_printk_skb: 102 callbacks suppressed May 14 00:32:32.457022 kernel: audit: type=1325 audit(1747182752.455:1011): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:32.458797 kernel: audit: type=1300 audit(1747182752.455:1011): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdb3377d0 a2=0 a3=1 items=0 ppid=2221 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:32.455000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdb3377d0 a2=0 a3=1 items=0 ppid=2221 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:32.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:32.464105 kernel: audit: type=1327 audit(1747182752.455:1011): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:32.465000 audit[2756]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:32.465000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffdb3377d0 a2=0 a3=1 items=0 ppid=2221 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:32.471628 kernel: audit: type=1325 audit(1747182752.465:1012): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:32.471678 kernel: audit: type=1300 audit(1747182752.465:1012): arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffdb3377d0 a2=0 a3=1 items=0 ppid=2221 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:32.471714 kernel: audit: type=1327 audit(1747182752.465:1012): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:32.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:32.823568 env[1215]: time="2025-05-14T00:32:32.823426080Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:32.826249 env[1215]: time="2025-05-14T00:32:32.826213705Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:32.828332 env[1215]: time="2025-05-14T00:32:32.828300814Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:32.830269 env[1215]: time="2025-05-14T00:32:32.830240723Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:32.831019 env[1215]: time="2025-05-14T00:32:32.830987679Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 14 00:32:32.834356 env[1215]: time="2025-05-14T00:32:32.834310462Z" level=info msg="CreateContainer within sandbox \"021a30c89a22384681e38152c1f13742b41275401f3619d407c7ff2d3bd19866\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 14 00:32:32.844903 env[1215]: time="2025-05-14T00:32:32.844867085Z" level=info msg="CreateContainer within sandbox \"021a30c89a22384681e38152c1f13742b41275401f3619d407c7ff2d3bd19866\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"1b2df8204fc96b63d20ad96d9bf8bd40296cd0800b2fa3819443cfa2aecd03e6\"" May 14 00:32:32.845482 env[1215]: time="2025-05-14T00:32:32.845448562Z" level=info msg="StartContainer for \"1b2df8204fc96b63d20ad96d9bf8bd40296cd0800b2fa3819443cfa2aecd03e6\"" May 14 00:32:32.867113 systemd[1]: Started cri-containerd-1b2df8204fc96b63d20ad96d9bf8bd40296cd0800b2fa3819443cfa2aecd03e6.scope. May 14 00:32:32.886839 kubelet[2059]: E0514 00:32:32.886760 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-95cpg" podUID="3e285113-a129-4a13-ae7d-6cc2fd3ed9b8" May 14 00:32:32.905000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.905000 audit[2765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2561 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:32.912872 kernel: audit: type=1400 audit(1747182752.905:1013): avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.912932 kernel: audit: type=1300 audit(1747182752.905:1013): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2561 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:32.912995 kernel: audit: type=1327 audit(1747182752.905:1013): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162326466383230346663393662363364323061643936643962663862 May 14 00:32:32.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162326466383230346663393662363364323061643936643962663862 May 14 00:32:32.905000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.918945 kernel: audit: type=1400 audit(1747182752.905:1014): avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.905000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.905000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.905000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.905000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.905000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.905000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.905000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.905000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.905000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.905000 audit: BPF prog-id=136 op=LOAD May 14 00:32:32.905000 audit[2765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2561 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:32.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162326466383230346663393662363364323061643936643962663862 May 14 00:32:32.908000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.908000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.908000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.908000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.908000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.908000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.908000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.908000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.908000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.908000 audit: BPF prog-id=137 op=LOAD May 14 00:32:32.908000 audit[2765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2561 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:32.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162326466383230346663393662363364323061643936643962663862 May 14 00:32:32.912000 audit: BPF prog-id=137 op=UNLOAD May 14 00:32:32.912000 audit: BPF prog-id=136 op=UNLOAD May 14 00:32:32.912000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.912000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.912000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.912000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.912000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.912000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.912000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.912000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.912000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.912000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:32.912000 audit: BPF prog-id=138 op=LOAD May 14 00:32:32.912000 audit[2765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2561 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:32.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162326466383230346663393662363364323061643936643962663862 May 14 00:32:32.976319 env[1215]: time="2025-05-14T00:32:32.976257579Z" level=info msg="StartContainer for \"1b2df8204fc96b63d20ad96d9bf8bd40296cd0800b2fa3819443cfa2aecd03e6\" returns successfully" May 14 00:32:32.984622 kubelet[2059]: E0514 00:32:32.984578 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:33.488679 systemd[1]: cri-containerd-1b2df8204fc96b63d20ad96d9bf8bd40296cd0800b2fa3819443cfa2aecd03e6.scope: Deactivated successfully. May 14 00:32:33.493000 audit: BPF prog-id=138 op=UNLOAD May 14 00:32:33.532864 env[1215]: time="2025-05-14T00:32:33.532811690Z" level=info msg="shim disconnected" id=1b2df8204fc96b63d20ad96d9bf8bd40296cd0800b2fa3819443cfa2aecd03e6 May 14 00:32:33.533188 env[1215]: time="2025-05-14T00:32:33.533166608Z" level=warning msg="cleaning up after shim disconnected" id=1b2df8204fc96b63d20ad96d9bf8bd40296cd0800b2fa3819443cfa2aecd03e6 namespace=k8s.io May 14 00:32:33.533287 env[1215]: time="2025-05-14T00:32:33.533272407Z" level=info msg="cleaning up dead shim" May 14 00:32:33.539610 env[1215]: time="2025-05-14T00:32:33.539577095Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:32:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2805 runtime=io.containerd.runc.v2\n" May 14 00:32:33.542871 kubelet[2059]: I0514 00:32:33.542837 2059 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 14 00:32:33.564423 kubelet[2059]: I0514 00:32:33.564384 2059 topology_manager.go:215] "Topology Admit Handler" podUID="da26cad3-09a9-45d7-9357-120de1647d0a" podNamespace="kube-system" podName="coredns-7db6d8ff4d-lcx2j" May 14 00:32:33.566098 kubelet[2059]: I0514 00:32:33.566074 2059 topology_manager.go:215] "Topology Admit Handler" podUID="977cc417-1f5d-46d2-97d8-aba0cd1a31e5" podNamespace="kube-system" podName="coredns-7db6d8ff4d-lrd4n" May 14 00:32:33.566207 kubelet[2059]: I0514 00:32:33.566176 2059 topology_manager.go:215] "Topology Admit Handler" podUID="2b74660c-a4b9-4ffb-8f62-59d1d5a78728" podNamespace="calico-apiserver" podName="calico-apiserver-6bc974fd89-n5sft" May 14 00:32:33.566903 kubelet[2059]: I0514 00:32:33.566318 2059 topology_manager.go:215] "Topology Admit Handler" podUID="6ad9fc77-4e30-476a-a258-873ab0a4feaa" podNamespace="calico-apiserver" podName="calico-apiserver-6bc974fd89-kqxn2" May 14 00:32:33.566903 kubelet[2059]: I0514 00:32:33.566465 2059 topology_manager.go:215] "Topology Admit Handler" podUID="9e88214d-945e-4dec-b917-4e940f481988" podNamespace="calico-system" podName="calico-kube-controllers-5c4b9d54d9-thmd5" May 14 00:32:33.575394 systemd[1]: Created slice kubepods-besteffort-pod2b74660c_a4b9_4ffb_8f62_59d1d5a78728.slice. May 14 00:32:33.581141 systemd[1]: Created slice kubepods-burstable-podda26cad3_09a9_45d7_9357_120de1647d0a.slice. May 14 00:32:33.586940 systemd[1]: Created slice kubepods-besteffort-pod9e88214d_945e_4dec_b917_4e940f481988.slice. May 14 00:32:33.590957 systemd[1]: Created slice kubepods-burstable-pod977cc417_1f5d_46d2_97d8_aba0cd1a31e5.slice. May 14 00:32:33.595600 kubelet[2059]: I0514 00:32:33.595572 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7pmnj\" (UniqueName: \"kubernetes.io/projected/2b74660c-a4b9-4ffb-8f62-59d1d5a78728-kube-api-access-7pmnj\") pod \"calico-apiserver-6bc974fd89-n5sft\" (UID: \"2b74660c-a4b9-4ffb-8f62-59d1d5a78728\") " pod="calico-apiserver/calico-apiserver-6bc974fd89-n5sft" May 14 00:32:33.595740 kubelet[2059]: I0514 00:32:33.595720 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mghv5\" (UniqueName: \"kubernetes.io/projected/9e88214d-945e-4dec-b917-4e940f481988-kube-api-access-mghv5\") pod \"calico-kube-controllers-5c4b9d54d9-thmd5\" (UID: \"9e88214d-945e-4dec-b917-4e940f481988\") " pod="calico-system/calico-kube-controllers-5c4b9d54d9-thmd5" May 14 00:32:33.595851 kubelet[2059]: I0514 00:32:33.595835 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/da26cad3-09a9-45d7-9357-120de1647d0a-config-volume\") pod \"coredns-7db6d8ff4d-lcx2j\" (UID: \"da26cad3-09a9-45d7-9357-120de1647d0a\") " pod="kube-system/coredns-7db6d8ff4d-lcx2j" May 14 00:32:33.595964 kubelet[2059]: I0514 00:32:33.595933 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/977cc417-1f5d-46d2-97d8-aba0cd1a31e5-config-volume\") pod \"coredns-7db6d8ff4d-lrd4n\" (UID: \"977cc417-1f5d-46d2-97d8-aba0cd1a31e5\") " pod="kube-system/coredns-7db6d8ff4d-lrd4n" May 14 00:32:33.596061 kubelet[2059]: I0514 00:32:33.596047 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2b74660c-a4b9-4ffb-8f62-59d1d5a78728-calico-apiserver-certs\") pod \"calico-apiserver-6bc974fd89-n5sft\" (UID: \"2b74660c-a4b9-4ffb-8f62-59d1d5a78728\") " pod="calico-apiserver/calico-apiserver-6bc974fd89-n5sft" May 14 00:32:33.596147 kubelet[2059]: I0514 00:32:33.596132 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-shbxh\" (UniqueName: \"kubernetes.io/projected/6ad9fc77-4e30-476a-a258-873ab0a4feaa-kube-api-access-shbxh\") pod \"calico-apiserver-6bc974fd89-kqxn2\" (UID: \"6ad9fc77-4e30-476a-a258-873ab0a4feaa\") " pod="calico-apiserver/calico-apiserver-6bc974fd89-kqxn2" May 14 00:32:33.596246 kubelet[2059]: I0514 00:32:33.596229 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9clqf\" (UniqueName: \"kubernetes.io/projected/da26cad3-09a9-45d7-9357-120de1647d0a-kube-api-access-9clqf\") pod \"coredns-7db6d8ff4d-lcx2j\" (UID: \"da26cad3-09a9-45d7-9357-120de1647d0a\") " pod="kube-system/coredns-7db6d8ff4d-lcx2j" May 14 00:32:33.596326 kubelet[2059]: I0514 00:32:33.596313 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tqsgq\" (UniqueName: \"kubernetes.io/projected/977cc417-1f5d-46d2-97d8-aba0cd1a31e5-kube-api-access-tqsgq\") pod \"coredns-7db6d8ff4d-lrd4n\" (UID: \"977cc417-1f5d-46d2-97d8-aba0cd1a31e5\") " pod="kube-system/coredns-7db6d8ff4d-lrd4n" May 14 00:32:33.596403 kubelet[2059]: I0514 00:32:33.596390 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9e88214d-945e-4dec-b917-4e940f481988-tigera-ca-bundle\") pod \"calico-kube-controllers-5c4b9d54d9-thmd5\" (UID: \"9e88214d-945e-4dec-b917-4e940f481988\") " pod="calico-system/calico-kube-controllers-5c4b9d54d9-thmd5" May 14 00:32:33.596490 kubelet[2059]: I0514 00:32:33.596475 2059 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6ad9fc77-4e30-476a-a258-873ab0a4feaa-calico-apiserver-certs\") pod \"calico-apiserver-6bc974fd89-kqxn2\" (UID: \"6ad9fc77-4e30-476a-a258-873ab0a4feaa\") " pod="calico-apiserver/calico-apiserver-6bc974fd89-kqxn2" May 14 00:32:33.598320 systemd[1]: Created slice kubepods-besteffort-pod6ad9fc77_4e30_476a_a258_873ab0a4feaa.slice. May 14 00:32:33.751716 systemd[1]: Started sshd@8-10.0.0.19:22-10.0.0.1:43044.service. May 14 00:32:33.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.19:22-10.0.0.1:43044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:33.797000 audit[2826]: USER_ACCT pid=2826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:33.798341 sshd[2826]: Accepted publickey for core from 10.0.0.1 port 43044 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:32:33.798000 audit[2826]: CRED_ACQ pid=2826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:33.798000 audit[2826]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdaf73e10 a2=3 a3=1 items=0 ppid=1 pid=2826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:33.798000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:32:33.799998 sshd[2826]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:32:33.803556 systemd-logind[1202]: New session 9 of user core. May 14 00:32:33.804452 systemd[1]: Started session-9.scope. May 14 00:32:33.807000 audit[2826]: USER_START pid=2826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:33.808000 audit[2828]: CRED_ACQ pid=2828 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:33.848356 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1b2df8204fc96b63d20ad96d9bf8bd40296cd0800b2fa3819443cfa2aecd03e6-rootfs.mount: Deactivated successfully. May 14 00:32:33.880449 env[1215]: time="2025-05-14T00:32:33.880397768Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bc974fd89-n5sft,Uid:2b74660c-a4b9-4ffb-8f62-59d1d5a78728,Namespace:calico-apiserver,Attempt:0,}" May 14 00:32:33.884671 kubelet[2059]: E0514 00:32:33.884620 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:33.885064 env[1215]: time="2025-05-14T00:32:33.885022744Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-lcx2j,Uid:da26cad3-09a9-45d7-9357-120de1647d0a,Namespace:kube-system,Attempt:0,}" May 14 00:32:33.889175 env[1215]: time="2025-05-14T00:32:33.889094443Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c4b9d54d9-thmd5,Uid:9e88214d-945e-4dec-b917-4e940f481988,Namespace:calico-system,Attempt:0,}" May 14 00:32:33.893955 kubelet[2059]: E0514 00:32:33.893921 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:33.894608 env[1215]: time="2025-05-14T00:32:33.894403375Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-lrd4n,Uid:977cc417-1f5d-46d2-97d8-aba0cd1a31e5,Namespace:kube-system,Attempt:0,}" May 14 00:32:33.903277 env[1215]: time="2025-05-14T00:32:33.903050611Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bc974fd89-kqxn2,Uid:6ad9fc77-4e30-476a-a258-873ab0a4feaa,Namespace:calico-apiserver,Attempt:0,}" May 14 00:32:33.947503 sshd[2826]: pam_unix(sshd:session): session closed for user core May 14 00:32:33.952000 audit[2826]: USER_END pid=2826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:33.953000 audit[2826]: CRED_DISP pid=2826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:33.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.19:22-10.0.0.1:43044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:33.955825 systemd[1]: sshd@8-10.0.0.19:22-10.0.0.1:43044.service: Deactivated successfully. May 14 00:32:33.957714 systemd[1]: session-9.scope: Deactivated successfully. May 14 00:32:33.960150 systemd-logind[1202]: Session 9 logged out. Waiting for processes to exit. May 14 00:32:33.963508 systemd-logind[1202]: Removed session 9. May 14 00:32:33.991290 kubelet[2059]: E0514 00:32:33.989294 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:33.996850 env[1215]: time="2025-05-14T00:32:33.996705645Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 14 00:32:34.152858 env[1215]: time="2025-05-14T00:32:34.152786222Z" level=error msg="Failed to destroy network for sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.153375 env[1215]: time="2025-05-14T00:32:34.153335780Z" level=error msg="encountered an error cleaning up failed sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.153446 env[1215]: time="2025-05-14T00:32:34.153417979Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bc974fd89-n5sft,Uid:2b74660c-a4b9-4ffb-8f62-59d1d5a78728,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.154142 kubelet[2059]: E0514 00:32:34.153875 2059 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.154142 kubelet[2059]: E0514 00:32:34.153945 2059 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bc974fd89-n5sft" May 14 00:32:34.154142 kubelet[2059]: E0514 00:32:34.153965 2059 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bc974fd89-n5sft" May 14 00:32:34.154353 kubelet[2059]: E0514 00:32:34.154009 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6bc974fd89-n5sft_calico-apiserver(2b74660c-a4b9-4ffb-8f62-59d1d5a78728)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6bc974fd89-n5sft_calico-apiserver(2b74660c-a4b9-4ffb-8f62-59d1d5a78728)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bc974fd89-n5sft" podUID="2b74660c-a4b9-4ffb-8f62-59d1d5a78728" May 14 00:32:34.157992 env[1215]: time="2025-05-14T00:32:34.157951796Z" level=error msg="Failed to destroy network for sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.158393 env[1215]: time="2025-05-14T00:32:34.158357794Z" level=error msg="encountered an error cleaning up failed sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.158445 env[1215]: time="2025-05-14T00:32:34.158412834Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-lrd4n,Uid:977cc417-1f5d-46d2-97d8-aba0cd1a31e5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.158598 kubelet[2059]: E0514 00:32:34.158560 2059 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.158651 kubelet[2059]: E0514 00:32:34.158614 2059 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-lrd4n" May 14 00:32:34.158651 kubelet[2059]: E0514 00:32:34.158632 2059 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-lrd4n" May 14 00:32:34.158709 kubelet[2059]: E0514 00:32:34.158670 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-lrd4n_kube-system(977cc417-1f5d-46d2-97d8-aba0cd1a31e5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-lrd4n_kube-system(977cc417-1f5d-46d2-97d8-aba0cd1a31e5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-lrd4n" podUID="977cc417-1f5d-46d2-97d8-aba0cd1a31e5" May 14 00:32:34.167520 env[1215]: time="2025-05-14T00:32:34.167476749Z" level=error msg="Failed to destroy network for sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.167948 env[1215]: time="2025-05-14T00:32:34.167911107Z" level=error msg="encountered an error cleaning up failed sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.168125 env[1215]: time="2025-05-14T00:32:34.168052866Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c4b9d54d9-thmd5,Uid:9e88214d-945e-4dec-b917-4e940f481988,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.168446 kubelet[2059]: E0514 00:32:34.168374 2059 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.168446 kubelet[2059]: E0514 00:32:34.168427 2059 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5c4b9d54d9-thmd5" May 14 00:32:34.168548 kubelet[2059]: E0514 00:32:34.168448 2059 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5c4b9d54d9-thmd5" May 14 00:32:34.168548 kubelet[2059]: E0514 00:32:34.168494 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5c4b9d54d9-thmd5_calico-system(9e88214d-945e-4dec-b917-4e940f481988)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5c4b9d54d9-thmd5_calico-system(9e88214d-945e-4dec-b917-4e940f481988)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5c4b9d54d9-thmd5" podUID="9e88214d-945e-4dec-b917-4e940f481988" May 14 00:32:34.172251 env[1215]: time="2025-05-14T00:32:34.172207045Z" level=error msg="Failed to destroy network for sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.172643 env[1215]: time="2025-05-14T00:32:34.172610643Z" level=error msg="encountered an error cleaning up failed sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.172761 env[1215]: time="2025-05-14T00:32:34.172732602Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-lcx2j,Uid:da26cad3-09a9-45d7-9357-120de1647d0a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.173054 kubelet[2059]: E0514 00:32:34.173012 2059 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.173130 kubelet[2059]: E0514 00:32:34.173061 2059 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-lcx2j" May 14 00:32:34.173130 kubelet[2059]: E0514 00:32:34.173078 2059 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-lcx2j" May 14 00:32:34.173197 kubelet[2059]: E0514 00:32:34.173125 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-lcx2j_kube-system(da26cad3-09a9-45d7-9357-120de1647d0a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-lcx2j_kube-system(da26cad3-09a9-45d7-9357-120de1647d0a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-lcx2j" podUID="da26cad3-09a9-45d7-9357-120de1647d0a" May 14 00:32:34.181651 env[1215]: time="2025-05-14T00:32:34.181613318Z" level=error msg="Failed to destroy network for sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.181951 env[1215]: time="2025-05-14T00:32:34.181921076Z" level=error msg="encountered an error cleaning up failed sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.182006 env[1215]: time="2025-05-14T00:32:34.181967796Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bc974fd89-kqxn2,Uid:6ad9fc77-4e30-476a-a258-873ab0a4feaa,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.182200 kubelet[2059]: E0514 00:32:34.182154 2059 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.182254 kubelet[2059]: E0514 00:32:34.182210 2059 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bc974fd89-kqxn2" May 14 00:32:34.182254 kubelet[2059]: E0514 00:32:34.182226 2059 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bc974fd89-kqxn2" May 14 00:32:34.182351 kubelet[2059]: E0514 00:32:34.182271 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6bc974fd89-kqxn2_calico-apiserver(6ad9fc77-4e30-476a-a258-873ab0a4feaa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6bc974fd89-kqxn2_calico-apiserver(6ad9fc77-4e30-476a-a258-873ab0a4feaa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bc974fd89-kqxn2" podUID="6ad9fc77-4e30-476a-a258-873ab0a4feaa" May 14 00:32:34.843380 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8-shm.mount: Deactivated successfully. May 14 00:32:34.843473 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985-shm.mount: Deactivated successfully. May 14 00:32:34.843526 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b-shm.mount: Deactivated successfully. May 14 00:32:34.892555 systemd[1]: Created slice kubepods-besteffort-pod3e285113_a129_4a13_ae7d_6cc2fd3ed9b8.slice. May 14 00:32:34.894843 env[1215]: time="2025-05-14T00:32:34.894800905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-95cpg,Uid:3e285113-a129-4a13-ae7d-6cc2fd3ed9b8,Namespace:calico-system,Attempt:0,}" May 14 00:32:34.952871 env[1215]: time="2025-05-14T00:32:34.952813294Z" level=error msg="Failed to destroy network for sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.954951 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b-shm.mount: Deactivated successfully. May 14 00:32:34.955863 env[1215]: time="2025-05-14T00:32:34.955813799Z" level=error msg="encountered an error cleaning up failed sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.955934 env[1215]: time="2025-05-14T00:32:34.955878079Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-95cpg,Uid:3e285113-a129-4a13-ae7d-6cc2fd3ed9b8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.956109 kubelet[2059]: E0514 00:32:34.956077 2059 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:34.956343 kubelet[2059]: E0514 00:32:34.956136 2059 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-95cpg" May 14 00:32:34.956343 kubelet[2059]: E0514 00:32:34.956155 2059 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-95cpg" May 14 00:32:34.956343 kubelet[2059]: E0514 00:32:34.956205 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-95cpg_calico-system(3e285113-a129-4a13-ae7d-6cc2fd3ed9b8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-95cpg_calico-system(3e285113-a129-4a13-ae7d-6cc2fd3ed9b8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-95cpg" podUID="3e285113-a129-4a13-ae7d-6cc2fd3ed9b8" May 14 00:32:34.993487 kubelet[2059]: I0514 00:32:34.993458 2059 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:32:34.994331 env[1215]: time="2025-05-14T00:32:34.994299086Z" level=info msg="StopPodSandbox for \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\"" May 14 00:32:34.997518 kubelet[2059]: I0514 00:32:34.997066 2059 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:32:34.997663 env[1215]: time="2025-05-14T00:32:34.997632349Z" level=info msg="StopPodSandbox for \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\"" May 14 00:32:34.999300 kubelet[2059]: I0514 00:32:34.999076 2059 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:32:35.000006 env[1215]: time="2025-05-14T00:32:34.999966978Z" level=info msg="StopPodSandbox for \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\"" May 14 00:32:35.003039 kubelet[2059]: I0514 00:32:35.003018 2059 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:32:35.003664 env[1215]: time="2025-05-14T00:32:35.003395681Z" level=info msg="StopPodSandbox for \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\"" May 14 00:32:35.005094 kubelet[2059]: I0514 00:32:35.005061 2059 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:32:35.005488 env[1215]: time="2025-05-14T00:32:35.005449111Z" level=info msg="StopPodSandbox for \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\"" May 14 00:32:35.007896 kubelet[2059]: I0514 00:32:35.007797 2059 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:32:35.009363 env[1215]: time="2025-05-14T00:32:35.009327572Z" level=info msg="StopPodSandbox for \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\"" May 14 00:32:35.056723 env[1215]: time="2025-05-14T00:32:35.056668783Z" level=error msg="StopPodSandbox for \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\" failed" error="failed to destroy network for sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:35.057170 kubelet[2059]: E0514 00:32:35.057118 2059 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:32:35.057257 kubelet[2059]: E0514 00:32:35.057194 2059 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b"} May 14 00:32:35.057295 kubelet[2059]: E0514 00:32:35.057266 2059 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e285113-a129-4a13-ae7d-6cc2fd3ed9b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:32:35.057347 kubelet[2059]: E0514 00:32:35.057289 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e285113-a129-4a13-ae7d-6cc2fd3ed9b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-95cpg" podUID="3e285113-a129-4a13-ae7d-6cc2fd3ed9b8" May 14 00:32:35.057713 env[1215]: time="2025-05-14T00:32:35.057673338Z" level=error msg="StopPodSandbox for \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\" failed" error="failed to destroy network for sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:35.057867 kubelet[2059]: E0514 00:32:35.057832 2059 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:32:35.057911 kubelet[2059]: E0514 00:32:35.057866 2059 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8"} May 14 00:32:35.057911 kubelet[2059]: E0514 00:32:35.057894 2059 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9e88214d-945e-4dec-b917-4e940f481988\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:32:35.057990 kubelet[2059]: E0514 00:32:35.057913 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9e88214d-945e-4dec-b917-4e940f481988\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5c4b9d54d9-thmd5" podUID="9e88214d-945e-4dec-b917-4e940f481988" May 14 00:32:35.060556 env[1215]: time="2025-05-14T00:32:35.060512604Z" level=error msg="StopPodSandbox for \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\" failed" error="failed to destroy network for sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:35.060731 kubelet[2059]: E0514 00:32:35.060683 2059 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:32:35.060811 kubelet[2059]: E0514 00:32:35.060730 2059 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1"} May 14 00:32:35.060811 kubelet[2059]: E0514 00:32:35.060754 2059 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6ad9fc77-4e30-476a-a258-873ab0a4feaa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:32:35.060880 kubelet[2059]: E0514 00:32:35.060825 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6ad9fc77-4e30-476a-a258-873ab0a4feaa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bc974fd89-kqxn2" podUID="6ad9fc77-4e30-476a-a258-873ab0a4feaa" May 14 00:32:35.061122 env[1215]: time="2025-05-14T00:32:35.061081481Z" level=error msg="StopPodSandbox for \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\" failed" error="failed to destroy network for sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:35.061282 kubelet[2059]: E0514 00:32:35.061247 2059 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:32:35.061339 kubelet[2059]: E0514 00:32:35.061289 2059 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123"} May 14 00:32:35.061339 kubelet[2059]: E0514 00:32:35.061317 2059 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"977cc417-1f5d-46d2-97d8-aba0cd1a31e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:32:35.061403 kubelet[2059]: E0514 00:32:35.061335 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"977cc417-1f5d-46d2-97d8-aba0cd1a31e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-lrd4n" podUID="977cc417-1f5d-46d2-97d8-aba0cd1a31e5" May 14 00:32:35.083737 env[1215]: time="2025-05-14T00:32:35.083666332Z" level=error msg="StopPodSandbox for \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\" failed" error="failed to destroy network for sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:35.083945 kubelet[2059]: E0514 00:32:35.083899 2059 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:32:35.084136 kubelet[2059]: E0514 00:32:35.084111 2059 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b"} May 14 00:32:35.084284 kubelet[2059]: E0514 00:32:35.084257 2059 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2b74660c-a4b9-4ffb-8f62-59d1d5a78728\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:32:35.084346 kubelet[2059]: E0514 00:32:35.084295 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2b74660c-a4b9-4ffb-8f62-59d1d5a78728\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bc974fd89-n5sft" podUID="2b74660c-a4b9-4ffb-8f62-59d1d5a78728" May 14 00:32:35.090723 env[1215]: time="2025-05-14T00:32:35.090680378Z" level=error msg="StopPodSandbox for \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\" failed" error="failed to destroy network for sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:32:35.090898 kubelet[2059]: E0514 00:32:35.090857 2059 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:32:35.090952 kubelet[2059]: E0514 00:32:35.090898 2059 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985"} May 14 00:32:35.090952 kubelet[2059]: E0514 00:32:35.090923 2059 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"da26cad3-09a9-45d7-9357-120de1647d0a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:32:35.091016 kubelet[2059]: E0514 00:32:35.090942 2059 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"da26cad3-09a9-45d7-9357-120de1647d0a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-lcx2j" podUID="da26cad3-09a9-45d7-9357-120de1647d0a" May 14 00:32:38.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.19:22-10.0.0.1:43058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:38.951756 systemd[1]: Started sshd@9-10.0.0.19:22-10.0.0.1:43058.service. May 14 00:32:38.955794 kernel: kauditd_printk_skb: 51 callbacks suppressed May 14 00:32:38.955891 kernel: audit: type=1130 audit(1747182758.951:1029): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.19:22-10.0.0.1:43058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:39.004000 audit[3208]: USER_ACCT pid=3208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.007307 sshd[3208]: Accepted publickey for core from 10.0.0.1 port 43058 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:32:39.007709 sshd[3208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:32:39.006000 audit[3208]: CRED_ACQ pid=3208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.011681 kernel: audit: type=1101 audit(1747182759.004:1030): pid=3208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.013410 kernel: audit: type=1103 audit(1747182759.006:1031): pid=3208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.013540 kernel: audit: type=1006 audit(1747182759.006:1032): pid=3208 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 14 00:32:39.013570 kernel: audit: type=1300 audit(1747182759.006:1032): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc52cf9e0 a2=3 a3=1 items=0 ppid=1 pid=3208 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:39.006000 audit[3208]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc52cf9e0 a2=3 a3=1 items=0 ppid=1 pid=3208 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:39.012722 systemd[1]: Started session-10.scope. May 14 00:32:39.013079 systemd-logind[1202]: New session 10 of user core. May 14 00:32:39.006000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:32:39.019248 kernel: audit: type=1327 audit(1747182759.006:1032): proctitle=737368643A20636F7265205B707269765D May 14 00:32:39.022000 audit[3208]: USER_START pid=3208 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.024000 audit[3210]: CRED_ACQ pid=3210 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.029675 kernel: audit: type=1105 audit(1747182759.022:1033): pid=3208 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.029767 kernel: audit: type=1103 audit(1747182759.024:1034): pid=3210 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.047542 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount592186678.mount: Deactivated successfully. May 14 00:32:39.143676 env[1215]: time="2025-05-14T00:32:39.143175970Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:39.145388 env[1215]: time="2025-05-14T00:32:39.145343161Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:39.147752 env[1215]: time="2025-05-14T00:32:39.147482272Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:39.149554 env[1215]: time="2025-05-14T00:32:39.149248024Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:39.150801 env[1215]: time="2025-05-14T00:32:39.149747022Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 14 00:32:39.178007 env[1215]: time="2025-05-14T00:32:39.176269348Z" level=info msg="CreateContainer within sandbox \"021a30c89a22384681e38152c1f13742b41275401f3619d407c7ff2d3bd19866\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 14 00:32:39.199246 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1232414697.mount: Deactivated successfully. May 14 00:32:39.204737 env[1215]: time="2025-05-14T00:32:39.204605827Z" level=info msg="CreateContainer within sandbox \"021a30c89a22384681e38152c1f13742b41275401f3619d407c7ff2d3bd19866\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1157db1c33824292641d4a4f799837eb14c5cd6d2b9f60d890a71df1e48c2805\"" May 14 00:32:39.205526 env[1215]: time="2025-05-14T00:32:39.205478423Z" level=info msg="StartContainer for \"1157db1c33824292641d4a4f799837eb14c5cd6d2b9f60d890a71df1e48c2805\"" May 14 00:32:39.227683 systemd[1]: Started cri-containerd-1157db1c33824292641d4a4f799837eb14c5cd6d2b9f60d890a71df1e48c2805.scope. May 14 00:32:39.269000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.269000 audit[3229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2561 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:39.277055 kernel: audit: type=1400 audit(1747182759.269:1035): avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.277125 kernel: audit: type=1300 audit(1747182759.269:1035): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2561 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:39.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131353764623163333338323432393236343164346134663739393833 May 14 00:32:39.269000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.269000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.269000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.269000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.269000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.269000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.269000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.269000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.269000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.269000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.269000 audit: BPF prog-id=139 op=LOAD May 14 00:32:39.269000 audit[3229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2561 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:39.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131353764623163333338323432393236343164346134663739393833 May 14 00:32:39.273000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.273000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.273000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.273000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.273000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.273000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.273000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.273000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.273000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.273000 audit: BPF prog-id=140 op=LOAD May 14 00:32:39.273000 audit[3229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2561 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:39.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131353764623163333338323432393236343164346134663739393833 May 14 00:32:39.276000 audit: BPF prog-id=140 op=UNLOAD May 14 00:32:39.276000 audit: BPF prog-id=139 op=UNLOAD May 14 00:32:39.276000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.276000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.276000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.276000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.276000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.276000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.276000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.276000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.276000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.276000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:39.276000 audit: BPF prog-id=141 op=LOAD May 14 00:32:39.276000 audit[3229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2561 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:39.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131353764623163333338323432393236343164346134663739393833 May 14 00:32:39.292631 env[1215]: time="2025-05-14T00:32:39.292583809Z" level=info msg="StartContainer for \"1157db1c33824292641d4a4f799837eb14c5cd6d2b9f60d890a71df1e48c2805\" returns successfully" May 14 00:32:39.292914 sshd[3208]: pam_unix(sshd:session): session closed for user core May 14 00:32:39.295360 systemd[1]: Started sshd@10-10.0.0.19:22-10.0.0.1:43062.service. May 14 00:32:39.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.19:22-10.0.0.1:43062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:39.295000 audit[3208]: USER_END pid=3208 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.295000 audit[3208]: CRED_DISP pid=3208 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.298457 systemd[1]: sshd@9-10.0.0.19:22-10.0.0.1:43058.service: Deactivated successfully. May 14 00:32:39.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.19:22-10.0.0.1:43058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:39.299163 systemd[1]: session-10.scope: Deactivated successfully. May 14 00:32:39.300229 systemd-logind[1202]: Session 10 logged out. Waiting for processes to exit. May 14 00:32:39.300928 systemd-logind[1202]: Removed session 10. May 14 00:32:39.340000 audit[3253]: USER_ACCT pid=3253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.341607 sshd[3253]: Accepted publickey for core from 10.0.0.1 port 43062 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:32:39.341000 audit[3253]: CRED_ACQ pid=3253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.342000 audit[3253]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdacb1f80 a2=3 a3=1 items=0 ppid=1 pid=3253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:39.342000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:32:39.343130 sshd[3253]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:32:39.351331 systemd-logind[1202]: New session 11 of user core. May 14 00:32:39.351699 systemd[1]: Started session-11.scope. May 14 00:32:39.357000 audit[3253]: USER_START pid=3253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.361000 audit[3264]: CRED_ACQ pid=3264 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.507291 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 14 00:32:39.507445 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 14 00:32:39.541894 sshd[3253]: pam_unix(sshd:session): session closed for user core May 14 00:32:39.543000 audit[3253]: USER_END pid=3253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.543000 audit[3253]: CRED_DISP pid=3253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.546192 systemd[1]: Started sshd@11-10.0.0.19:22-10.0.0.1:43064.service. May 14 00:32:39.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.19:22-10.0.0.1:43064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:39.547172 systemd[1]: sshd@10-10.0.0.19:22-10.0.0.1:43062.service: Deactivated successfully. May 14 00:32:39.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.19:22-10.0.0.1:43062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:39.551525 systemd[1]: session-11.scope: Deactivated successfully. May 14 00:32:39.558389 systemd-logind[1202]: Session 11 logged out. Waiting for processes to exit. May 14 00:32:39.563859 systemd-logind[1202]: Removed session 11. May 14 00:32:39.597000 audit[3280]: USER_ACCT pid=3280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.598535 sshd[3280]: Accepted publickey for core from 10.0.0.1 port 43064 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:32:39.598000 audit[3280]: CRED_ACQ pid=3280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.598000 audit[3280]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff33b9c60 a2=3 a3=1 items=0 ppid=1 pid=3280 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:39.598000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:32:39.600314 sshd[3280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:32:39.604412 systemd-logind[1202]: New session 12 of user core. May 14 00:32:39.605368 systemd[1]: Started session-12.scope. May 14 00:32:39.608000 audit[3280]: USER_START pid=3280 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.609000 audit[3285]: CRED_ACQ pid=3285 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.754444 sshd[3280]: pam_unix(sshd:session): session closed for user core May 14 00:32:39.755000 audit[3280]: USER_END pid=3280 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.755000 audit[3280]: CRED_DISP pid=3280 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:39.758353 systemd[1]: sshd@11-10.0.0.19:22-10.0.0.1:43064.service: Deactivated successfully. May 14 00:32:39.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.19:22-10.0.0.1:43064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:39.759145 systemd[1]: session-12.scope: Deactivated successfully. May 14 00:32:39.759670 systemd-logind[1202]: Session 12 logged out. Waiting for processes to exit. May 14 00:32:39.760347 systemd-logind[1202]: Removed session 12. May 14 00:32:40.024636 kubelet[2059]: E0514 00:32:40.024603 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:40.796000 audit[3374]: AVC avc: denied { write } for pid=3374 comm="tee" name="fd" dev="proc" ino=18400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:32:40.796000 audit[3374]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeaed6a34 a2=241 a3=1b6 items=1 ppid=3346 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:40.796000 audit: CWD cwd="/etc/service/enabled/cni/log" May 14 00:32:40.796000 audit: PATH item=0 name="/dev/fd/63" inode=17386 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:32:40.796000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:32:40.800000 audit[3376]: AVC avc: denied { write } for pid=3376 comm="tee" name="fd" dev="proc" ino=17396 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:32:40.800000 audit[3376]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff24d3a32 a2=241 a3=1b6 items=1 ppid=3348 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:40.800000 audit: CWD cwd="/etc/service/enabled/confd/log" May 14 00:32:40.800000 audit: PATH item=0 name="/dev/fd/63" inode=17387 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:32:40.800000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:32:40.808000 audit[3397]: AVC avc: denied { write } for pid=3397 comm="tee" name="fd" dev="proc" ino=18411 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:32:40.808000 audit[3397]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcde37a32 a2=241 a3=1b6 items=1 ppid=3347 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:40.808000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 14 00:32:40.808000 audit: PATH item=0 name="/dev/fd/63" inode=18404 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:32:40.808000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:32:40.812000 audit[3394]: AVC avc: denied { write } for pid=3394 comm="tee" name="fd" dev="proc" ino=18417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:32:40.812000 audit[3394]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc7a99a32 a2=241 a3=1b6 items=1 ppid=3353 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:40.812000 audit: CWD cwd="/etc/service/enabled/felix/log" May 14 00:32:40.812000 audit: PATH item=0 name="/dev/fd/63" inode=17400 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:32:40.812000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:32:40.831000 audit[3411]: AVC avc: denied { write } for pid=3411 comm="tee" name="fd" dev="proc" ino=17406 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:32:40.831000 audit[3411]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc330fa33 a2=241 a3=1b6 items=1 ppid=3359 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:40.831000 audit: CWD cwd="/etc/service/enabled/bird/log" May 14 00:32:40.831000 audit: PATH item=0 name="/dev/fd/63" inode=17401 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:32:40.831000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:32:40.833000 audit[3421]: AVC avc: denied { write } for pid=3421 comm="tee" name="fd" dev="proc" ino=20482 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:32:40.833000 audit[3421]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc2669a23 a2=241 a3=1b6 items=1 ppid=3349 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:40.833000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 14 00:32:40.833000 audit: PATH item=0 name="/dev/fd/63" inode=18423 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:32:40.833000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:32:40.865000 audit[3427]: AVC avc: denied { write } for pid=3427 comm="tee" name="fd" dev="proc" ino=19820 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:32:40.865000 audit[3427]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc0acba22 a2=241 a3=1b6 items=1 ppid=3362 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:40.865000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 14 00:32:40.865000 audit: PATH item=0 name="/dev/fd/63" inode=19811 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:32:40.865000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit: BPF prog-id=142 op=LOAD May 14 00:32:40.953000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff68a2268 a2=98 a3=fffff68a2258 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:40.953000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:40.953000 audit: BPF prog-id=142 op=UNLOAD May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit: BPF prog-id=143 op=LOAD May 14 00:32:40.953000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff68a1ef8 a2=74 a3=95 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:40.953000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:40.953000 audit: BPF prog-id=143 op=UNLOAD May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:40.953000 audit: BPF prog-id=144 op=LOAD May 14 00:32:40.953000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff68a1f58 a2=94 a3=2 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:40.953000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:40.953000 audit: BPF prog-id=144 op=UNLOAD May 14 00:32:41.026684 kubelet[2059]: E0514 00:32:41.026648 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:41.041000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.041000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.041000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.041000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.041000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.041000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.041000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.041000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.041000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.041000 audit: BPF prog-id=145 op=LOAD May 14 00:32:41.041000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff68a1f18 a2=40 a3=fffff68a1f48 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.041000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.041000 audit: BPF prog-id=145 op=UNLOAD May 14 00:32:41.041000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.041000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff68a2030 a2=50 a3=0 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.041000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.047590 systemd[1]: run-containerd-runc-k8s.io-1157db1c33824292641d4a4f799837eb14c5cd6d2b9f60d890a71df1e48c2805-runc.Xjzmdv.mount: Deactivated successfully. May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff68a1f88 a2=28 a3=fffff68a20b8 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff68a1fb8 a2=28 a3=fffff68a20e8 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff68a1e68 a2=28 a3=fffff68a1f98 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff68a1fd8 a2=28 a3=fffff68a2108 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff68a1fb8 a2=28 a3=fffff68a20e8 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff68a1fa8 a2=28 a3=fffff68a20d8 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff68a1fd8 a2=28 a3=fffff68a2108 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff68a1fb8 a2=28 a3=fffff68a20e8 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff68a1fd8 a2=28 a3=fffff68a2108 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff68a1fa8 a2=28 a3=fffff68a20d8 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff68a2028 a2=28 a3=fffff68a2168 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff68a1d60 a2=50 a3=0 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit: BPF prog-id=146 op=LOAD May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff68a1d68 a2=94 a3=5 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.055000 audit: BPF prog-id=146 op=UNLOAD May 14 00:32:41.055000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.055000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff68a1e70 a2=50 a3=0 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff68a1fb8 a2=4 a3=3 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:32:41.056000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff68a1f98 a2=94 a3=6 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:32:41.056000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff68a1768 a2=94 a3=83 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.056000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:32:41.056000 audit[3461]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff68a1768 a2=94 a3=83 items=0 ppid=3356 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:32:41.071000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.071000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.071000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.071000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.071000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.071000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.071000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.071000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.071000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.071000 audit: BPF prog-id=147 op=LOAD May 14 00:32:41.071000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0de6d18 a2=98 a3=ffffd0de6d08 items=0 ppid=3356 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.071000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:32:41.072000 audit: BPF prog-id=147 op=UNLOAD May 14 00:32:41.072000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit: BPF prog-id=148 op=LOAD May 14 00:32:41.072000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0de6bc8 a2=74 a3=95 items=0 ppid=3356 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.072000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:32:41.072000 audit: BPF prog-id=148 op=UNLOAD May 14 00:32:41.072000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.072000 audit: BPF prog-id=149 op=LOAD May 14 00:32:41.072000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0de6bf8 a2=40 a3=ffffd0de6c28 items=0 ppid=3356 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.072000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:32:41.072000 audit: BPF prog-id=149 op=UNLOAD May 14 00:32:41.122389 systemd-networkd[1040]: vxlan.calico: Link UP May 14 00:32:41.122397 systemd-networkd[1040]: vxlan.calico: Gained carrier May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit: BPF prog-id=150 op=LOAD May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe50ae6b8 a2=98 a3=ffffe50ae6a8 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit: BPF prog-id=150 op=UNLOAD May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit: BPF prog-id=151 op=LOAD May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe50ae398 a2=74 a3=95 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit: BPF prog-id=151 op=UNLOAD May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit: BPF prog-id=152 op=LOAD May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe50ae3f8 a2=94 a3=2 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit: BPF prog-id=152 op=UNLOAD May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe50ae428 a2=28 a3=ffffe50ae558 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe50ae458 a2=28 a3=ffffe50ae588 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe50ae308 a2=28 a3=ffffe50ae438 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe50ae478 a2=28 a3=ffffe50ae5a8 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe50ae458 a2=28 a3=ffffe50ae588 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe50ae448 a2=28 a3=ffffe50ae578 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe50ae478 a2=28 a3=ffffe50ae5a8 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe50ae458 a2=28 a3=ffffe50ae588 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe50ae478 a2=28 a3=ffffe50ae5a8 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.148000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.148000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe50ae448 a2=28 a3=ffffe50ae578 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe50ae4c8 a2=28 a3=ffffe50ae608 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.149000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit: BPF prog-id=153 op=LOAD May 14 00:32:41.149000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe50ae2e8 a2=40 a3=ffffe50ae318 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.149000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.149000 audit: BPF prog-id=153 op=UNLOAD May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffe50ae310 a2=50 a3=0 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.149000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffe50ae310 a2=50 a3=0 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.149000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit: BPF prog-id=154 op=LOAD May 14 00:32:41.149000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe50ada78 a2=94 a3=2 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.149000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.149000 audit: BPF prog-id=154 op=UNLOAD May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { perfmon } for pid=3518 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit[3518]: AVC avc: denied { bpf } for pid=3518 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.149000 audit: BPF prog-id=155 op=LOAD May 14 00:32:41.149000 audit[3518]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe50adc08 a2=94 a3=30 items=0 ppid=3356 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.149000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit: BPF prog-id=156 op=LOAD May 14 00:32:41.154000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd8a980e8 a2=98 a3=ffffd8a980d8 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.154000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.154000 audit: BPF prog-id=156 op=UNLOAD May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit: BPF prog-id=157 op=LOAD May 14 00:32:41.154000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd8a97d78 a2=74 a3=95 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.154000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.154000 audit: BPF prog-id=157 op=UNLOAD May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.154000 audit: BPF prog-id=158 op=LOAD May 14 00:32:41.154000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd8a97dd8 a2=94 a3=2 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.154000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.154000 audit: BPF prog-id=158 op=UNLOAD May 14 00:32:41.239000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.239000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.239000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.239000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.239000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.239000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.239000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.239000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.239000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.239000 audit: BPF prog-id=159 op=LOAD May 14 00:32:41.239000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd8a97d98 a2=40 a3=ffffd8a97dc8 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.239000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.239000 audit: BPF prog-id=159 op=UNLOAD May 14 00:32:41.239000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.239000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd8a97eb0 a2=50 a3=0 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.239000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8a97e08 a2=28 a3=ffffd8a97f38 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8a97e38 a2=28 a3=ffffd8a97f68 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8a97ce8 a2=28 a3=ffffd8a97e18 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8a97e58 a2=28 a3=ffffd8a97f88 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8a97e38 a2=28 a3=ffffd8a97f68 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8a97e28 a2=28 a3=ffffd8a97f58 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8a97e58 a2=28 a3=ffffd8a97f88 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8a97e38 a2=28 a3=ffffd8a97f68 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8a97e58 a2=28 a3=ffffd8a97f88 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8a97e28 a2=28 a3=ffffd8a97f58 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8a97ea8 a2=28 a3=ffffd8a97fe8 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd8a97be0 a2=50 a3=0 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.248000 audit: BPF prog-id=160 op=LOAD May 14 00:32:41.248000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd8a97be8 a2=94 a3=5 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.249000 audit: BPF prog-id=160 op=UNLOAD May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd8a97cf0 a2=50 a3=0 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.249000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd8a97e38 a2=4 a3=3 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.249000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { confidentiality } for pid=3522 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:32:41.249000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd8a97e18 a2=94 a3=6 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.249000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { confidentiality } for pid=3522 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:32:41.249000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd8a975e8 a2=94 a3=83 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.249000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { confidentiality } for pid=3522 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:32:41.249000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd8a975e8 a2=94 a3=83 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.249000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd8a99028 a2=10 a3=ffffd8a99118 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.249000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd8a98ee8 a2=10 a3=ffffd8a98fd8 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.249000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.249000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.249000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd8a98e58 a2=10 a3=ffffd8a98fd8 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.249000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.250000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:41.250000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd8a98e58 a2=10 a3=ffffd8a98fd8 items=0 ppid=3356 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.250000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:32:41.256000 audit: BPF prog-id=155 op=UNLOAD May 14 00:32:41.296000 audit[3550]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3550 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:32:41.296000 audit[3550]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe30f1160 a2=0 a3=ffffabe0cfa8 items=0 ppid=3356 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.296000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:32:41.303000 audit[3551]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3551 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:32:41.303000 audit[3551]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffff32e8960 a2=0 a3=ffffada89fa8 items=0 ppid=3356 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.303000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:32:41.312000 audit[3555]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3555 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:32:41.312000 audit[3555]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffe9863f70 a2=0 a3=ffffae009fa8 items=0 ppid=3356 pid=3555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.312000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:32:41.314000 audit[3552]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3552 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:32:41.314000 audit[3552]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffff8c5e170 a2=0 a3=ffffb47cbfa8 items=0 ppid=3356 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:41.314000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:32:42.028069 kubelet[2059]: E0514 00:32:42.028015 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:42.402939 systemd-networkd[1040]: vxlan.calico: Gained IPv6LL May 14 00:32:44.759331 systemd[1]: Started sshd@12-10.0.0.19:22-10.0.0.1:42134.service. May 14 00:32:44.760757 kernel: kauditd_printk_skb: 581 callbacks suppressed May 14 00:32:44.760833 kernel: audit: type=1130 audit(1747182764.758:1164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.19:22-10.0.0.1:42134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:44.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.19:22-10.0.0.1:42134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:44.917000 audit[3595]: USER_ACCT pid=3595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:44.918125 sshd[3595]: Accepted publickey for core from 10.0.0.1 port 42134 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:32:44.919988 sshd[3595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:32:44.918000 audit[3595]: CRED_ACQ pid=3595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:44.924206 kernel: audit: type=1101 audit(1747182764.917:1165): pid=3595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:44.924288 kernel: audit: type=1103 audit(1747182764.918:1166): pid=3595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:44.924320 kernel: audit: type=1006 audit(1747182764.918:1167): pid=3595 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 14 00:32:44.918000 audit[3595]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe74c14c0 a2=3 a3=1 items=0 ppid=1 pid=3595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:44.928830 systemd-logind[1202]: New session 13 of user core. May 14 00:32:44.929307 systemd[1]: Started session-13.scope. May 14 00:32:44.929414 kernel: audit: type=1300 audit(1747182764.918:1167): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe74c14c0 a2=3 a3=1 items=0 ppid=1 pid=3595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:44.929435 kernel: audit: type=1327 audit(1747182764.918:1167): proctitle=737368643A20636F7265205B707269765D May 14 00:32:44.918000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:32:44.932000 audit[3595]: USER_START pid=3595 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:44.933000 audit[3597]: CRED_ACQ pid=3597 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:44.939802 kernel: audit: type=1105 audit(1747182764.932:1168): pid=3595 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:44.939873 kernel: audit: type=1103 audit(1747182764.933:1169): pid=3597 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:45.062900 sshd[3595]: pam_unix(sshd:session): session closed for user core May 14 00:32:45.063000 audit[3595]: USER_END pid=3595 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:45.065811 systemd[1]: session-13.scope: Deactivated successfully. May 14 00:32:45.066377 systemd-logind[1202]: Session 13 logged out. Waiting for processes to exit. May 14 00:32:45.066540 systemd[1]: sshd@12-10.0.0.19:22-10.0.0.1:42134.service: Deactivated successfully. May 14 00:32:45.067530 systemd-logind[1202]: Removed session 13. May 14 00:32:45.063000 audit[3595]: CRED_DISP pid=3595 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:45.071092 kernel: audit: type=1106 audit(1747182765.063:1170): pid=3595 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:45.071153 kernel: audit: type=1104 audit(1747182765.063:1171): pid=3595 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:45.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.19:22-10.0.0.1:42134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:45.886371 env[1215]: time="2025-05-14T00:32:45.886329351Z" level=info msg="StopPodSandbox for \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\"" May 14 00:32:45.886710 env[1215]: time="2025-05-14T00:32:45.886375351Z" level=info msg="StopPodSandbox for \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\"" May 14 00:32:45.959051 kubelet[2059]: I0514 00:32:45.958614 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-f8kdv" podStartSLOduration=7.3026661090000005 podStartE2EDuration="20.958597605s" podCreationTimestamp="2025-05-14 00:32:25 +0000 UTC" firstStartedPulling="2025-05-14 00:32:25.495601158 +0000 UTC m=+23.713057209" lastFinishedPulling="2025-05-14 00:32:39.151532654 +0000 UTC m=+37.368988705" observedRunningTime="2025-05-14 00:32:40.044018669 +0000 UTC m=+38.261474720" watchObservedRunningTime="2025-05-14 00:32:45.958597605 +0000 UTC m=+44.176053656" May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:45.960 [INFO][3644] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:45.960 [INFO][3644] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" iface="eth0" netns="/var/run/netns/cni-45f47de8-b69e-dfc0-5a6c-b588638f63e9" May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:45.960 [INFO][3644] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" iface="eth0" netns="/var/run/netns/cni-45f47de8-b69e-dfc0-5a6c-b588638f63e9" May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:45.961 [INFO][3644] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" iface="eth0" netns="/var/run/netns/cni-45f47de8-b69e-dfc0-5a6c-b588638f63e9" May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:45.961 [INFO][3644] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:45.961 [INFO][3644] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:46.048 [INFO][3662] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" HandleID="k8s-pod-network.87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:46.048 [INFO][3662] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:46.048 [INFO][3662] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:46.057 [WARNING][3662] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" HandleID="k8s-pod-network.87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:46.057 [INFO][3662] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" HandleID="k8s-pod-network.87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:46.058 [INFO][3662] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:46.065600 env[1215]: 2025-05-14 00:32:46.063 [INFO][3644] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:32:46.066650 env[1215]: time="2025-05-14T00:32:46.066618572Z" level=info msg="TearDown network for sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\" successfully" May 14 00:32:46.066731 env[1215]: time="2025-05-14T00:32:46.066714931Z" level=info msg="StopPodSandbox for \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\" returns successfully" May 14 00:32:46.068637 systemd[1]: run-netns-cni\x2d45f47de8\x2db69e\x2ddfc0\x2d5a6c\x2db588638f63e9.mount: Deactivated successfully. May 14 00:32:46.070025 env[1215]: time="2025-05-14T00:32:46.069956000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bc974fd89-n5sft,Uid:2b74660c-a4b9-4ffb-8f62-59d1d5a78728,Namespace:calico-apiserver,Attempt:1,}" May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:45.958 [INFO][3643] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:45.958 [INFO][3643] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" iface="eth0" netns="/var/run/netns/cni-ece19714-e5fc-0c2e-c67a-c4d3360b279c" May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:45.959 [INFO][3643] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" iface="eth0" netns="/var/run/netns/cni-ece19714-e5fc-0c2e-c67a-c4d3360b279c" May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:45.959 [INFO][3643] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" iface="eth0" netns="/var/run/netns/cni-ece19714-e5fc-0c2e-c67a-c4d3360b279c" May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:45.959 [INFO][3643] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:45.959 [INFO][3643] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:46.048 [INFO][3660] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" HandleID="k8s-pod-network.34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:46.048 [INFO][3660] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:46.058 [INFO][3660] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:46.066 [WARNING][3660] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" HandleID="k8s-pod-network.34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:46.066 [INFO][3660] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" HandleID="k8s-pod-network.34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:46.070 [INFO][3660] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:46.073878 env[1215]: 2025-05-14 00:32:46.072 [INFO][3643] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:32:46.074237 env[1215]: time="2025-05-14T00:32:46.074003145Z" level=info msg="TearDown network for sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\" successfully" May 14 00:32:46.074237 env[1215]: time="2025-05-14T00:32:46.074025305Z" level=info msg="StopPodSandbox for \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\" returns successfully" May 14 00:32:46.074992 kubelet[2059]: E0514 00:32:46.074959 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:46.075581 env[1215]: time="2025-05-14T00:32:46.075538659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-lrd4n,Uid:977cc417-1f5d-46d2-97d8-aba0cd1a31e5,Namespace:kube-system,Attempt:1,}" May 14 00:32:46.075832 systemd[1]: run-netns-cni\x2dece19714\x2de5fc\x2d0c2e\x2dc67a\x2dc4d3360b279c.mount: Deactivated successfully. May 14 00:32:46.209475 systemd-networkd[1040]: cali6b2098cb76c: Link UP May 14 00:32:46.210907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:32:46.210978 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6b2098cb76c: link becomes ready May 14 00:32:46.211257 systemd-networkd[1040]: cali6b2098cb76c: Gained carrier May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.125 [INFO][3676] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0 calico-apiserver-6bc974fd89- calico-apiserver 2b74660c-a4b9-4ffb-8f62-59d1d5a78728 880 0 2025-05-14 00:32:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bc974fd89 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6bc974fd89-n5sft eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6b2098cb76c [] []}} ContainerID="78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-n5sft" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.126 [INFO][3676] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-n5sft" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.160 [INFO][3703] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" HandleID="k8s-pod-network.78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.175 [INFO][3703] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" HandleID="k8s-pod-network.78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40005c3b40), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6bc974fd89-n5sft", "timestamp":"2025-05-14 00:32:46.160655272 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.175 [INFO][3703] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.175 [INFO][3703] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.175 [INFO][3703] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.177 [INFO][3703] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" host="localhost" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.182 [INFO][3703] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.186 [INFO][3703] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.190 [INFO][3703] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.191 [INFO][3703] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.192 [INFO][3703] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" host="localhost" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.193 [INFO][3703] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.196 [INFO][3703] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" host="localhost" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.200 [INFO][3703] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" host="localhost" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.201 [INFO][3703] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" host="localhost" May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.201 [INFO][3703] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:46.225860 env[1215]: 2025-05-14 00:32:46.201 [INFO][3703] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" HandleID="k8s-pod-network.78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:32:46.226705 env[1215]: 2025-05-14 00:32:46.204 [INFO][3676] cni-plugin/k8s.go 386: Populated endpoint ContainerID="78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-n5sft" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0", GenerateName:"calico-apiserver-6bc974fd89-", Namespace:"calico-apiserver", SelfLink:"", UID:"2b74660c-a4b9-4ffb-8f62-59d1d5a78728", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bc974fd89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6bc974fd89-n5sft", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b2098cb76c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:46.226705 env[1215]: 2025-05-14 00:32:46.204 [INFO][3676] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-n5sft" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:32:46.226705 env[1215]: 2025-05-14 00:32:46.204 [INFO][3676] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6b2098cb76c ContainerID="78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-n5sft" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:32:46.226705 env[1215]: 2025-05-14 00:32:46.211 [INFO][3676] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-n5sft" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:32:46.226705 env[1215]: 2025-05-14 00:32:46.212 [INFO][3676] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-n5sft" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0", GenerateName:"calico-apiserver-6bc974fd89-", Namespace:"calico-apiserver", SelfLink:"", UID:"2b74660c-a4b9-4ffb-8f62-59d1d5a78728", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bc974fd89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be", Pod:"calico-apiserver-6bc974fd89-n5sft", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b2098cb76c", MAC:"fe:dd:2d:14:1a:9d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:46.226705 env[1215]: 2025-05-14 00:32:46.220 [INFO][3676] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-n5sft" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:32:46.232000 audit[3733]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=3733 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:32:46.232000 audit[3733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23492 a0=3 a1=ffffe547b760 a2=0 a3=ffff91f3bfa8 items=0 ppid=3356 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.232000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:32:46.238976 systemd-networkd[1040]: cali210f76c3cb9: Link UP May 14 00:32:46.241936 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali210f76c3cb9: link becomes ready May 14 00:32:46.240417 systemd-networkd[1040]: cali210f76c3cb9: Gained carrier May 14 00:32:46.246230 env[1215]: time="2025-05-14T00:32:46.244052652Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:32:46.246230 env[1215]: time="2025-05-14T00:32:46.244096691Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:32:46.246230 env[1215]: time="2025-05-14T00:32:46.244130171Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:32:46.246415 env[1215]: time="2025-05-14T00:32:46.246290364Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be pid=3743 runtime=io.containerd.runc.v2 May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.134 [INFO][3680] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0 coredns-7db6d8ff4d- kube-system 977cc417-1f5d-46d2-97d8-aba0cd1a31e5 881 0 2025-05-14 00:32:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-lrd4n eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali210f76c3cb9 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lrd4n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lrd4n-" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.135 [INFO][3680] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lrd4n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.160 [INFO][3705] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" HandleID="k8s-pod-network.0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.175 [INFO][3705] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" HandleID="k8s-pod-network.0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002db1b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-lrd4n", "timestamp":"2025-05-14 00:32:46.160720552 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.175 [INFO][3705] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.201 [INFO][3705] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.201 [INFO][3705] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.202 [INFO][3705] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" host="localhost" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.206 [INFO][3705] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.212 [INFO][3705] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.217 [INFO][3705] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.221 [INFO][3705] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.221 [INFO][3705] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" host="localhost" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.222 [INFO][3705] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.229 [INFO][3705] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" host="localhost" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.234 [INFO][3705] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" host="localhost" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.234 [INFO][3705] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" host="localhost" May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.234 [INFO][3705] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:46.252891 env[1215]: 2025-05-14 00:32:46.234 [INFO][3705] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" HandleID="k8s-pod-network.0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:32:46.253501 env[1215]: 2025-05-14 00:32:46.237 [INFO][3680] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lrd4n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"977cc417-1f5d-46d2-97d8-aba0cd1a31e5", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-lrd4n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali210f76c3cb9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:46.253501 env[1215]: 2025-05-14 00:32:46.237 [INFO][3680] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lrd4n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:32:46.253501 env[1215]: 2025-05-14 00:32:46.237 [INFO][3680] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali210f76c3cb9 ContainerID="0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lrd4n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:32:46.253501 env[1215]: 2025-05-14 00:32:46.240 [INFO][3680] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lrd4n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:32:46.253501 env[1215]: 2025-05-14 00:32:46.241 [INFO][3680] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lrd4n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"977cc417-1f5d-46d2-97d8-aba0cd1a31e5", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e", Pod:"coredns-7db6d8ff4d-lrd4n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali210f76c3cb9", MAC:"4a:0a:7d:56:c6:37", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:46.253501 env[1215]: 2025-05-14 00:32:46.248 [INFO][3680] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lrd4n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:32:46.258000 audit[3776]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3776 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:32:46.258000 audit[3776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffd3d73670 a2=0 a3=ffffb4756fa8 items=0 ppid=3356 pid=3776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.258000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:32:46.260026 systemd[1]: Started cri-containerd-78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be.scope. May 14 00:32:46.273800 env[1215]: time="2025-05-14T00:32:46.271223554Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:32:46.273800 env[1215]: time="2025-05-14T00:32:46.271266273Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:32:46.273800 env[1215]: time="2025-05-14T00:32:46.271276393Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:32:46.273800 env[1215]: time="2025-05-14T00:32:46.271458633Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e pid=3789 runtime=io.containerd.runc.v2 May 14 00:32:46.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit: BPF prog-id=161 op=LOAD May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3743 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343434613665656331383430613432393335376462626665643332 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3743 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343434613665656331383430613432393335376462626665643332 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit: BPF prog-id=162 op=LOAD May 14 00:32:46.280000 audit[3753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3743 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343434613665656331383430613432393335376462626665643332 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit: BPF prog-id=163 op=LOAD May 14 00:32:46.280000 audit[3753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3743 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343434613665656331383430613432393335376462626665643332 May 14 00:32:46.280000 audit: BPF prog-id=163 op=UNLOAD May 14 00:32:46.280000 audit: BPF prog-id=162 op=UNLOAD May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.280000 audit: BPF prog-id=164 op=LOAD May 14 00:32:46.280000 audit[3753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3743 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343434613665656331383430613432393335376462626665643332 May 14 00:32:46.282604 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:32:46.286847 systemd[1]: Started cri-containerd-0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e.scope. May 14 00:32:46.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.304000 audit: BPF prog-id=165 op=LOAD May 14 00:32:46.305000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.305000 audit[3802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3789 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333363306638646434373862363061613563643566363632323962 May 14 00:32:46.305000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.305000 audit[3802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3789 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333363306638646434373862363061613563643566363632323962 May 14 00:32:46.306000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.306000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.306000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.306000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.306000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.306000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.306000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.306000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.306000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.307703 env[1215]: time="2025-05-14T00:32:46.307664742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bc974fd89-n5sft,Uid:2b74660c-a4b9-4ffb-8f62-59d1d5a78728,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be\"" May 14 00:32:46.306000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.306000 audit: BPF prog-id=166 op=LOAD May 14 00:32:46.306000 audit[3802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3789 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333363306638646434373862363061613563643566363632323962 May 14 00:32:46.307000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.307000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.307000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.307000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.307000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.307000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.307000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.307000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.307000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.307000 audit: BPF prog-id=167 op=LOAD May 14 00:32:46.307000 audit[3802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3789 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333363306638646434373862363061613563643566363632323962 May 14 00:32:46.308000 audit: BPF prog-id=167 op=UNLOAD May 14 00:32:46.308000 audit: BPF prog-id=166 op=UNLOAD May 14 00:32:46.309000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.309000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.310570 env[1215]: time="2025-05-14T00:32:46.310488492Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 14 00:32:46.309000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.309000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.309000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.309000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.309000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.309000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.309000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.309000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.309000 audit: BPF prog-id=168 op=LOAD May 14 00:32:46.309000 audit[3802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3789 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333363306638646434373862363061613563643566363632323962 May 14 00:32:46.313502 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:32:46.333687 env[1215]: time="2025-05-14T00:32:46.333651448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-lrd4n,Uid:977cc417-1f5d-46d2-97d8-aba0cd1a31e5,Namespace:kube-system,Attempt:1,} returns sandbox id \"0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e\"" May 14 00:32:46.334429 kubelet[2059]: E0514 00:32:46.334410 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:46.336500 env[1215]: time="2025-05-14T00:32:46.336459078Z" level=info msg="CreateContainer within sandbox \"0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 14 00:32:46.349615 env[1215]: time="2025-05-14T00:32:46.349572671Z" level=info msg="CreateContainer within sandbox \"0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6a30de2b2881ebd3ef48705df418eac4c6efcb0ad5fbc440eb82826a8ec08eec\"" May 14 00:32:46.350124 env[1215]: time="2025-05-14T00:32:46.350029229Z" level=info msg="StartContainer for \"6a30de2b2881ebd3ef48705df418eac4c6efcb0ad5fbc440eb82826a8ec08eec\"" May 14 00:32:46.363535 systemd[1]: Started cri-containerd-6a30de2b2881ebd3ef48705df418eac4c6efcb0ad5fbc440eb82826a8ec08eec.scope. May 14 00:32:46.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit: BPF prog-id=169 op=LOAD May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3789 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661333064653262323838316562643365663438373035646634313865 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3789 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661333064653262323838316562643365663438373035646634313865 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit: BPF prog-id=170 op=LOAD May 14 00:32:46.390000 audit[3845]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3789 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661333064653262323838316562643365663438373035646634313865 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit: BPF prog-id=171 op=LOAD May 14 00:32:46.390000 audit[3845]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3789 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661333064653262323838316562643365663438373035646634313865 May 14 00:32:46.390000 audit: BPF prog-id=171 op=UNLOAD May 14 00:32:46.390000 audit: BPF prog-id=170 op=UNLOAD May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:46.390000 audit: BPF prog-id=172 op=LOAD May 14 00:32:46.390000 audit[3845]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3789 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:46.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661333064653262323838316562643365663438373035646634313865 May 14 00:32:46.403036 env[1215]: time="2025-05-14T00:32:46.402996718Z" level=info msg="StartContainer for \"6a30de2b2881ebd3ef48705df418eac4c6efcb0ad5fbc440eb82826a8ec08eec\" returns successfully" May 14 00:32:46.887626 env[1215]: time="2025-05-14T00:32:46.887530291Z" level=info msg="StopPodSandbox for \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\"" May 14 00:32:46.888029 env[1215]: time="2025-05-14T00:32:46.887882409Z" level=info msg="StopPodSandbox for \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\"" May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.934 [INFO][3910] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.935 [INFO][3910] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" iface="eth0" netns="/var/run/netns/cni-40cc10db-ef17-3f03-3c25-e7897f9dd13f" May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.935 [INFO][3910] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" iface="eth0" netns="/var/run/netns/cni-40cc10db-ef17-3f03-3c25-e7897f9dd13f" May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.935 [INFO][3910] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" iface="eth0" netns="/var/run/netns/cni-40cc10db-ef17-3f03-3c25-e7897f9dd13f" May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.935 [INFO][3910] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.935 [INFO][3910] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.957 [INFO][3927] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" HandleID="k8s-pod-network.73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.957 [INFO][3927] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.957 [INFO][3927] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.965 [WARNING][3927] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" HandleID="k8s-pod-network.73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.965 [INFO][3927] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" HandleID="k8s-pod-network.73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.967 [INFO][3927] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:46.974030 env[1215]: 2025-05-14 00:32:46.968 [INFO][3910] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:32:46.975457 env[1215]: time="2025-05-14T00:32:46.974151578Z" level=info msg="TearDown network for sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\" successfully" May 14 00:32:46.975457 env[1215]: time="2025-05-14T00:32:46.974180938Z" level=info msg="StopPodSandbox for \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\" returns successfully" May 14 00:32:46.975524 kubelet[2059]: E0514 00:32:46.974977 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:46.976692 env[1215]: time="2025-05-14T00:32:46.975986732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-lcx2j,Uid:da26cad3-09a9-45d7-9357-120de1647d0a,Namespace:kube-system,Attempt:1,}" May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.934 [INFO][3911] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.934 [INFO][3911] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" iface="eth0" netns="/var/run/netns/cni-32981cb0-42cc-6114-8210-c487b4397bd9" May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.935 [INFO][3911] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" iface="eth0" netns="/var/run/netns/cni-32981cb0-42cc-6114-8210-c487b4397bd9" May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.935 [INFO][3911] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" iface="eth0" netns="/var/run/netns/cni-32981cb0-42cc-6114-8210-c487b4397bd9" May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.935 [INFO][3911] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.935 [INFO][3911] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.960 [INFO][3928] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" HandleID="k8s-pod-network.ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.960 [INFO][3928] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.967 [INFO][3928] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.975 [WARNING][3928] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" HandleID="k8s-pod-network.ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.975 [INFO][3928] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" HandleID="k8s-pod-network.ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.976 [INFO][3928] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:46.981164 env[1215]: 2025-05-14 00:32:46.979 [INFO][3911] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:32:46.981538 env[1215]: time="2025-05-14T00:32:46.981259633Z" level=info msg="TearDown network for sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\" successfully" May 14 00:32:46.981538 env[1215]: time="2025-05-14T00:32:46.981283433Z" level=info msg="StopPodSandbox for \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\" returns successfully" May 14 00:32:46.981898 env[1215]: time="2025-05-14T00:32:46.981865431Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bc974fd89-kqxn2,Uid:6ad9fc77-4e30-476a-a258-873ab0a4feaa,Namespace:calico-apiserver,Attempt:1,}" May 14 00:32:47.042025 kubelet[2059]: E0514 00:32:47.041904 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:47.072869 systemd[1]: run-netns-cni\x2d32981cb0\x2d42cc\x2d6114\x2d8210\x2dc487b4397bd9.mount: Deactivated successfully. May 14 00:32:47.072950 systemd[1]: run-netns-cni\x2d40cc10db\x2def17\x2d3f03\x2d3c25\x2de7897f9dd13f.mount: Deactivated successfully. May 14 00:32:47.094000 audit[3989]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=3989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:47.094000 audit[3989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffffc4aea30 a2=0 a3=1 items=0 ppid=2221 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:47.104000 audit[3989]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:47.104000 audit[3989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=fffffc4aea30 a2=0 a3=1 items=0 ppid=2221 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:47.128626 systemd-networkd[1040]: cali0d6e41ba56e: Link UP May 14 00:32:47.129833 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0d6e41ba56e: link becomes ready May 14 00:32:47.129858 systemd-networkd[1040]: cali0d6e41ba56e: Gained carrier May 14 00:32:47.140397 kubelet[2059]: I0514 00:32:47.140288 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-lrd4n" podStartSLOduration=28.14026111 podStartE2EDuration="28.14026111s" podCreationTimestamp="2025-05-14 00:32:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:32:47.051613183 +0000 UTC m=+45.269069234" watchObservedRunningTime="2025-05-14 00:32:47.14026111 +0000 UTC m=+45.357717161" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.022 [INFO][3941] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0 coredns-7db6d8ff4d- kube-system da26cad3-09a9-45d7-9357-120de1647d0a 899 0 2025-05-14 00:32:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-lcx2j eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0d6e41ba56e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lcx2j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lcx2j-" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.022 [INFO][3941] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lcx2j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.064 [INFO][3972] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" HandleID="k8s-pod-network.cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.084 [INFO][3972] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" HandleID="k8s-pod-network.cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ef6f0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-lcx2j", "timestamp":"2025-05-14 00:32:47.064548897 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.084 [INFO][3972] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.084 [INFO][3972] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.084 [INFO][3972] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.099 [INFO][3972] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" host="localhost" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.103 [INFO][3972] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.107 [INFO][3972] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.109 [INFO][3972] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.110 [INFO][3972] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.111 [INFO][3972] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" host="localhost" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.112 [INFO][3972] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221 May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.115 [INFO][3972] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" host="localhost" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.120 [INFO][3972] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" host="localhost" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.120 [INFO][3972] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" host="localhost" May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.120 [INFO][3972] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:47.143355 env[1215]: 2025-05-14 00:32:47.120 [INFO][3972] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" HandleID="k8s-pod-network.cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:32:47.143885 env[1215]: 2025-05-14 00:32:47.124 [INFO][3941] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lcx2j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"da26cad3-09a9-45d7-9357-120de1647d0a", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-lcx2j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d6e41ba56e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:47.143885 env[1215]: 2025-05-14 00:32:47.124 [INFO][3941] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lcx2j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:32:47.143885 env[1215]: 2025-05-14 00:32:47.124 [INFO][3941] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0d6e41ba56e ContainerID="cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lcx2j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:32:47.143885 env[1215]: 2025-05-14 00:32:47.130 [INFO][3941] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lcx2j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:32:47.143885 env[1215]: 2025-05-14 00:32:47.130 [INFO][3941] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lcx2j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"da26cad3-09a9-45d7-9357-120de1647d0a", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221", Pod:"coredns-7db6d8ff4d-lcx2j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d6e41ba56e", MAC:"9a:2f:5a:89:25:91", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:47.143885 env[1215]: 2025-05-14 00:32:47.140 [INFO][3941] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221" Namespace="kube-system" Pod="coredns-7db6d8ff4d-lcx2j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:32:47.150000 audit[4005]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=4005 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:32:47.150000 audit[4005]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18220 a0=3 a1=fffff47d1110 a2=0 a3=ffff89388fa8 items=0 ppid=3356 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.150000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:32:47.161227 env[1215]: time="2025-05-14T00:32:47.160510038Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:32:47.161227 env[1215]: time="2025-05-14T00:32:47.160560438Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:32:47.161227 env[1215]: time="2025-05-14T00:32:47.160578398Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:32:47.161227 env[1215]: time="2025-05-14T00:32:47.160729437Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221 pid=4014 runtime=io.containerd.runc.v2 May 14 00:32:47.175806 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali244c5524f1a: link becomes ready May 14 00:32:47.176930 systemd-networkd[1040]: cali244c5524f1a: Link UP May 14 00:32:47.177080 systemd-networkd[1040]: cali244c5524f1a: Gained carrier May 14 00:32:47.181644 systemd[1]: run-containerd-runc-k8s.io-cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221-runc.eu2u12.mount: Deactivated successfully. May 14 00:32:47.184122 systemd[1]: Started cri-containerd-cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221.scope. May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.029 [INFO][3954] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0 calico-apiserver-6bc974fd89- calico-apiserver 6ad9fc77-4e30-476a-a258-873ab0a4feaa 900 0 2025-05-14 00:32:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bc974fd89 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6bc974fd89-kqxn2 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali244c5524f1a [] []}} ContainerID="4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-kqxn2" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.030 [INFO][3954] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-kqxn2" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.074 [INFO][3980] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" HandleID="k8s-pod-network.4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.100 [INFO][3980] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" HandleID="k8s-pod-network.4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400039aa50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6bc974fd89-kqxn2", "timestamp":"2025-05-14 00:32:47.074730621 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.100 [INFO][3980] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.120 [INFO][3980] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.121 [INFO][3980] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.122 [INFO][3980] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" host="localhost" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.136 [INFO][3980] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.145 [INFO][3980] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.147 [INFO][3980] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.152 [INFO][3980] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.153 [INFO][3980] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" host="localhost" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.155 [INFO][3980] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532 May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.158 [INFO][3980] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" host="localhost" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.168 [INFO][3980] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" host="localhost" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.168 [INFO][3980] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" host="localhost" May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.168 [INFO][3980] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:47.197559 env[1215]: 2025-05-14 00:32:47.168 [INFO][3980] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" HandleID="k8s-pod-network.4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:32:47.198151 env[1215]: 2025-05-14 00:32:47.171 [INFO][3954] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-kqxn2" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0", GenerateName:"calico-apiserver-6bc974fd89-", Namespace:"calico-apiserver", SelfLink:"", UID:"6ad9fc77-4e30-476a-a258-873ab0a4feaa", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bc974fd89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6bc974fd89-kqxn2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali244c5524f1a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:47.198151 env[1215]: 2025-05-14 00:32:47.171 [INFO][3954] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-kqxn2" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:32:47.198151 env[1215]: 2025-05-14 00:32:47.171 [INFO][3954] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali244c5524f1a ContainerID="4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-kqxn2" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:32:47.198151 env[1215]: 2025-05-14 00:32:47.175 [INFO][3954] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-kqxn2" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:32:47.198151 env[1215]: 2025-05-14 00:32:47.178 [INFO][3954] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-kqxn2" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0", GenerateName:"calico-apiserver-6bc974fd89-", Namespace:"calico-apiserver", SelfLink:"", UID:"6ad9fc77-4e30-476a-a258-873ab0a4feaa", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bc974fd89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532", Pod:"calico-apiserver-6bc974fd89-kqxn2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali244c5524f1a", MAC:"36:e6:21:3f:12:3f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:47.198151 env[1215]: 2025-05-14 00:32:47.188 [INFO][3954] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532" Namespace="calico-apiserver" Pod="calico-apiserver-6bc974fd89-kqxn2" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:32:47.200000 audit[4041]: NETFILTER_CFG table=filter:106 family=2 entries=48 op=nft_register_chain pid=4041 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:32:47.200000 audit[4041]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25556 a0=3 a1=ffffef8f5f30 a2=0 a3=ffffaf903fa8 items=0 ppid=3356 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:32:47.210103 env[1215]: time="2025-05-14T00:32:47.210041103Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:32:47.210225 env[1215]: time="2025-05-14T00:32:47.210094303Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:32:47.210225 env[1215]: time="2025-05-14T00:32:47.210105143Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:32:47.210309 env[1215]: time="2025-05-14T00:32:47.210250423Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532 pid=4064 runtime=io.containerd.runc.v2 May 14 00:32:47.223852 systemd[1]: Started cri-containerd-4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532.scope. May 14 00:32:47.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.226000 audit: BPF prog-id=173 op=LOAD May 14 00:32:47.227000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.227000 audit[4025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4014 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316264376239643933313661373932366431306162363731663864 May 14 00:32:47.228000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.228000 audit[4025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4014 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316264376239643933313661373932366431306162363731663864 May 14 00:32:47.229000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.229000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.229000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.229000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.229000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.229000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.229000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.229000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.229000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.229000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.229000 audit: BPF prog-id=174 op=LOAD May 14 00:32:47.229000 audit[4025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4014 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316264376239643933313661373932366431306162363731663864 May 14 00:32:47.230000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.230000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.230000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.230000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.230000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.230000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.230000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.230000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.230000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.230000 audit: BPF prog-id=175 op=LOAD May 14 00:32:47.230000 audit[4025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4014 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316264376239643933313661373932366431306162363731663864 May 14 00:32:47.234000 audit: BPF prog-id=175 op=UNLOAD May 14 00:32:47.234000 audit: BPF prog-id=174 op=UNLOAD May 14 00:32:47.234000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.234000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.234000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.234000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.234000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.234000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.234000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.234000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.234000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.234000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.234000 audit: BPF prog-id=176 op=LOAD May 14 00:32:47.234000 audit[4025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4014 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316264376239643933313661373932366431306162363731663864 May 14 00:32:47.236212 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:32:47.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit: BPF prog-id=177 op=LOAD May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4064 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393034313234353865663234623439313632303831336138306336 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4064 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393034313234353865663234623439313632303831336138306336 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit: BPF prog-id=178 op=LOAD May 14 00:32:47.244000 audit[4073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4064 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393034313234353865663234623439313632303831336138306336 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit: BPF prog-id=179 op=LOAD May 14 00:32:47.244000 audit[4073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4064 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393034313234353865663234623439313632303831336138306336 May 14 00:32:47.244000 audit: BPF prog-id=179 op=UNLOAD May 14 00:32:47.244000 audit: BPF prog-id=178 op=UNLOAD May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.244000 audit: BPF prog-id=180 op=LOAD May 14 00:32:47.244000 audit[4073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4064 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393034313234353865663234623439313632303831336138306336 May 14 00:32:47.248404 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:32:47.254892 env[1215]: time="2025-05-14T00:32:47.254849345Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-lcx2j,Uid:da26cad3-09a9-45d7-9357-120de1647d0a,Namespace:kube-system,Attempt:1,} returns sandbox id \"cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221\"" May 14 00:32:47.256033 kubelet[2059]: E0514 00:32:47.256004 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:47.266277 env[1215]: time="2025-05-14T00:32:47.266242665Z" level=info msg="CreateContainer within sandbox \"cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 14 00:32:47.278092 env[1215]: time="2025-05-14T00:32:47.278047663Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bc974fd89-kqxn2,Uid:6ad9fc77-4e30-476a-a258-873ab0a4feaa,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532\"" May 14 00:32:47.278504 env[1215]: time="2025-05-14T00:32:47.278473782Z" level=info msg="CreateContainer within sandbox \"cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b1f7d6b5f3caa123ddf9c2cea17e79d67e876a7ac5035c6935ebf62ffa92dd95\"" May 14 00:32:47.278966 env[1215]: time="2025-05-14T00:32:47.278817260Z" level=info msg="StartContainer for \"b1f7d6b5f3caa123ddf9c2cea17e79d67e876a7ac5035c6935ebf62ffa92dd95\"" May 14 00:32:47.294736 systemd[1]: Started cri-containerd-b1f7d6b5f3caa123ddf9c2cea17e79d67e876a7ac5035c6935ebf62ffa92dd95.scope. May 14 00:32:47.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.314000 audit: BPF prog-id=181 op=LOAD May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4014 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663764366235663363616131323364646639633263656131376537 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4014 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663764366235663363616131323364646639633263656131376537 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit: BPF prog-id=182 op=LOAD May 14 00:32:47.315000 audit[4111]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4014 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663764366235663363616131323364646639633263656131376537 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit: BPF prog-id=183 op=LOAD May 14 00:32:47.315000 audit[4111]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4014 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663764366235663363616131323364646639633263656131376537 May 14 00:32:47.315000 audit: BPF prog-id=183 op=UNLOAD May 14 00:32:47.315000 audit: BPF prog-id=182 op=UNLOAD May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:47.315000 audit: BPF prog-id=184 op=LOAD May 14 00:32:47.315000 audit[4111]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4014 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:47.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663764366235663363616131323364646639633263656131376537 May 14 00:32:47.328852 env[1215]: time="2025-05-14T00:32:47.328814564Z" level=info msg="StartContainer for \"b1f7d6b5f3caa123ddf9c2cea17e79d67e876a7ac5035c6935ebf62ffa92dd95\" returns successfully" May 14 00:32:47.650938 systemd-networkd[1040]: cali210f76c3cb9: Gained IPv6LL May 14 00:32:47.906927 systemd-networkd[1040]: cali6b2098cb76c: Gained IPv6LL May 14 00:32:48.049715 kubelet[2059]: E0514 00:32:48.049673 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:48.050933 kubelet[2059]: E0514 00:32:48.050912 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:48.079000 audit[4143]: NETFILTER_CFG table=filter:107 family=2 entries=13 op=nft_register_rule pid=4143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:48.079000 audit[4143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe93106b0 a2=0 a3=1 items=0 ppid=2221 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:48.086693 kubelet[2059]: I0514 00:32:48.086641 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-lcx2j" podStartSLOduration=29.086623773 podStartE2EDuration="29.086623773s" podCreationTimestamp="2025-05-14 00:32:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:32:48.07607193 +0000 UTC m=+46.293528061" watchObservedRunningTime="2025-05-14 00:32:48.086623773 +0000 UTC m=+46.304079824" May 14 00:32:48.086000 audit[4143]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=4143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:48.086000 audit[4143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffe93106b0 a2=0 a3=1 items=0 ppid=2221 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.086000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:48.106000 audit[4146]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:48.106000 audit[4146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe76adbb0 a2=0 a3=1 items=0 ppid=2221 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.106000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:48.123000 audit[4146]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:48.123000 audit[4146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffe76adbb0 a2=0 a3=1 items=0 ppid=2221 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:48.290912 systemd-networkd[1040]: cali244c5524f1a: Gained IPv6LL May 14 00:32:48.562455 env[1215]: time="2025-05-14T00:32:48.562344167Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:48.563869 env[1215]: time="2025-05-14T00:32:48.563837122Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:48.565488 env[1215]: time="2025-05-14T00:32:48.565451156Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:48.567031 env[1215]: time="2025-05-14T00:32:48.567005751Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:48.567565 env[1215]: time="2025-05-14T00:32:48.567536989Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 14 00:32:48.569213 env[1215]: time="2025-05-14T00:32:48.569166143Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 14 00:32:48.570019 env[1215]: time="2025-05-14T00:32:48.569986300Z" level=info msg="CreateContainer within sandbox \"78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 14 00:32:48.582123 env[1215]: time="2025-05-14T00:32:48.582090618Z" level=info msg="CreateContainer within sandbox \"78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"99f3c043d3cbbe2c032d6aada2331f47fc9b95468f793987c4e1538517927f74\"" May 14 00:32:48.583480 env[1215]: time="2025-05-14T00:32:48.582622257Z" level=info msg="StartContainer for \"99f3c043d3cbbe2c032d6aada2331f47fc9b95468f793987c4e1538517927f74\"" May 14 00:32:48.603689 systemd[1]: Started cri-containerd-99f3c043d3cbbe2c032d6aada2331f47fc9b95468f793987c4e1538517927f74.scope. May 14 00:32:48.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.628000 audit: BPF prog-id=185 op=LOAD May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3743 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939663363303433643363626265326330333264366161646132333331 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3743 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939663363303433643363626265326330333264366161646132333331 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit: BPF prog-id=186 op=LOAD May 14 00:32:48.629000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3743 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939663363303433643363626265326330333264366161646132333331 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit: BPF prog-id=187 op=LOAD May 14 00:32:48.629000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3743 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939663363303433643363626265326330333264366161646132333331 May 14 00:32:48.629000 audit: BPF prog-id=187 op=UNLOAD May 14 00:32:48.629000 audit: BPF prog-id=186 op=UNLOAD May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.629000 audit: BPF prog-id=188 op=LOAD May 14 00:32:48.629000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3743 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939663363303433643363626265326330333264366161646132333331 May 14 00:32:48.647496 env[1215]: time="2025-05-14T00:32:48.647448752Z" level=info msg="StartContainer for \"99f3c043d3cbbe2c032d6aada2331f47fc9b95468f793987c4e1538517927f74\" returns successfully" May 14 00:32:48.864566 env[1215]: time="2025-05-14T00:32:48.864459961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:48.866069 env[1215]: time="2025-05-14T00:32:48.866022636Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:48.866889 systemd-networkd[1040]: cali0d6e41ba56e: Gained IPv6LL May 14 00:32:48.868202 env[1215]: time="2025-05-14T00:32:48.868094388Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:48.870378 env[1215]: time="2025-05-14T00:32:48.870341581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:48.870588 env[1215]: time="2025-05-14T00:32:48.870557420Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 14 00:32:48.872959 env[1215]: time="2025-05-14T00:32:48.872919332Z" level=info msg="CreateContainer within sandbox \"4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 14 00:32:48.881914 env[1215]: time="2025-05-14T00:32:48.881878821Z" level=info msg="CreateContainer within sandbox \"4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"719f5c7d64802695e435660f40919cc394ceb47f0955d7e98e127608eff95810\"" May 14 00:32:48.882439 env[1215]: time="2025-05-14T00:32:48.882405899Z" level=info msg="StartContainer for \"719f5c7d64802695e435660f40919cc394ceb47f0955d7e98e127608eff95810\"" May 14 00:32:48.887898 env[1215]: time="2025-05-14T00:32:48.887222042Z" level=info msg="StopPodSandbox for \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\"" May 14 00:32:48.897494 systemd[1]: Started cri-containerd-719f5c7d64802695e435660f40919cc394ceb47f0955d7e98e127608eff95810.scope. May 14 00:32:48.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.930000 audit: BPF prog-id=189 op=LOAD May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4064 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731396635633764363438303236393565343335363630663430393139 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4064 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731396635633764363438303236393565343335363630663430393139 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit: BPF prog-id=190 op=LOAD May 14 00:32:48.931000 audit[4196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4064 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731396635633764363438303236393565343335363630663430393139 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit: BPF prog-id=191 op=LOAD May 14 00:32:48.931000 audit[4196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4064 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731396635633764363438303236393565343335363630663430393139 May 14 00:32:48.931000 audit: BPF prog-id=191 op=UNLOAD May 14 00:32:48.931000 audit: BPF prog-id=190 op=UNLOAD May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:48.931000 audit: BPF prog-id=192 op=LOAD May 14 00:32:48.931000 audit[4196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4064 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:48.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731396635633764363438303236393565343335363630663430393139 May 14 00:32:48.969883 env[1215]: time="2025-05-14T00:32:48.969427278Z" level=info msg="StartContainer for \"719f5c7d64802695e435660f40919cc394ceb47f0955d7e98e127608eff95810\" returns successfully" May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.952 [INFO][4228] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.953 [INFO][4228] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" iface="eth0" netns="/var/run/netns/cni-07addeae-63f0-7ca0-ebe4-fafe562473e8" May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.953 [INFO][4228] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" iface="eth0" netns="/var/run/netns/cni-07addeae-63f0-7ca0-ebe4-fafe562473e8" May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.953 [INFO][4228] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" iface="eth0" netns="/var/run/netns/cni-07addeae-63f0-7ca0-ebe4-fafe562473e8" May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.953 [INFO][4228] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.953 [INFO][4228] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.981 [INFO][4237] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" HandleID="k8s-pod-network.810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.982 [INFO][4237] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.982 [INFO][4237] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.989 [WARNING][4237] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" HandleID="k8s-pod-network.810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.989 [INFO][4237] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" HandleID="k8s-pod-network.810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.991 [INFO][4237] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:48.996153 env[1215]: 2025-05-14 00:32:48.994 [INFO][4228] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:32:48.996569 env[1215]: time="2025-05-14T00:32:48.996271785Z" level=info msg="TearDown network for sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\" successfully" May 14 00:32:48.996569 env[1215]: time="2025-05-14T00:32:48.996301385Z" level=info msg="StopPodSandbox for \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\" returns successfully" May 14 00:32:48.997187 env[1215]: time="2025-05-14T00:32:48.997105822Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c4b9d54d9-thmd5,Uid:9e88214d-945e-4dec-b917-4e940f481988,Namespace:calico-system,Attempt:1,}" May 14 00:32:49.057330 kubelet[2059]: E0514 00:32:49.057294 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:49.058303 kubelet[2059]: E0514 00:32:49.058279 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:49.070866 systemd[1]: run-containerd-runc-k8s.io-99f3c043d3cbbe2c032d6aada2331f47fc9b95468f793987c4e1538517927f74-runc.wwGYsp.mount: Deactivated successfully. May 14 00:32:49.071002 systemd[1]: run-netns-cni\x2d07addeae\x2d63f0\x2d7ca0\x2debe4\x2dfafe562473e8.mount: Deactivated successfully. May 14 00:32:49.082420 kubelet[2059]: I0514 00:32:49.082355 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6bc974fd89-kqxn2" podStartSLOduration=22.489946735 podStartE2EDuration="24.082339572s" podCreationTimestamp="2025-05-14 00:32:25 +0000 UTC" firstStartedPulling="2025-05-14 00:32:47.279223019 +0000 UTC m=+45.496679070" lastFinishedPulling="2025-05-14 00:32:48.871615856 +0000 UTC m=+47.089071907" observedRunningTime="2025-05-14 00:32:49.081549935 +0000 UTC m=+47.299005986" watchObservedRunningTime="2025-05-14 00:32:49.082339572 +0000 UTC m=+47.299795623" May 14 00:32:49.082834 kubelet[2059]: I0514 00:32:49.082770 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6bc974fd89-n5sft" podStartSLOduration=21.823129603 podStartE2EDuration="24.082742571s" podCreationTimestamp="2025-05-14 00:32:25 +0000 UTC" firstStartedPulling="2025-05-14 00:32:46.308876618 +0000 UTC m=+44.526332669" lastFinishedPulling="2025-05-14 00:32:48.568489626 +0000 UTC m=+46.785945637" observedRunningTime="2025-05-14 00:32:49.067259303 +0000 UTC m=+47.284715354" watchObservedRunningTime="2025-05-14 00:32:49.082742571 +0000 UTC m=+47.300198622" May 14 00:32:49.105000 audit[4279]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4279 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:49.105000 audit[4279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc8cb0100 a2=0 a3=1 items=0 ppid=2221 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:49.105000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:49.110000 audit[4279]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4279 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:32:49.110000 audit[4279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc8cb0100 a2=0 a3=1 items=0 ppid=2221 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:49.110000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:32:49.143480 systemd-networkd[1040]: cali5ff33878e40: Link UP May 14 00:32:49.148299 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:32:49.148371 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ff33878e40: link becomes ready May 14 00:32:49.145496 systemd-networkd[1040]: cali5ff33878e40: Gained carrier May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.043 [INFO][4255] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0 calico-kube-controllers-5c4b9d54d9- calico-system 9e88214d-945e-4dec-b917-4e940f481988 941 0 2025-05-14 00:32:25 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5c4b9d54d9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-5c4b9d54d9-thmd5 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali5ff33878e40 [] []}} ContainerID="efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" Namespace="calico-system" Pod="calico-kube-controllers-5c4b9d54d9-thmd5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.043 [INFO][4255] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" Namespace="calico-system" Pod="calico-kube-controllers-5c4b9d54d9-thmd5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.097 [INFO][4271] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" HandleID="k8s-pod-network.efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.113 [INFO][4271] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" HandleID="k8s-pod-network.efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029cc50), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-5c4b9d54d9-thmd5", "timestamp":"2025-05-14 00:32:49.097224482 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.113 [INFO][4271] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.113 [INFO][4271] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.113 [INFO][4271] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.114 [INFO][4271] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" host="localhost" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.117 [INFO][4271] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.121 [INFO][4271] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.123 [INFO][4271] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.126 [INFO][4271] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.126 [INFO][4271] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" host="localhost" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.127 [INFO][4271] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.132 [INFO][4271] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" host="localhost" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.138 [INFO][4271] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" host="localhost" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.138 [INFO][4271] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" host="localhost" May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.138 [INFO][4271] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:49.162097 env[1215]: 2025-05-14 00:32:49.138 [INFO][4271] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" HandleID="k8s-pod-network.efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:32:49.162660 env[1215]: 2025-05-14 00:32:49.142 [INFO][4255] cni-plugin/k8s.go 386: Populated endpoint ContainerID="efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" Namespace="calico-system" Pod="calico-kube-controllers-5c4b9d54d9-thmd5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0", GenerateName:"calico-kube-controllers-5c4b9d54d9-", Namespace:"calico-system", SelfLink:"", UID:"9e88214d-945e-4dec-b917-4e940f481988", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c4b9d54d9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-5c4b9d54d9-thmd5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5ff33878e40", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:49.162660 env[1215]: 2025-05-14 00:32:49.142 [INFO][4255] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" Namespace="calico-system" Pod="calico-kube-controllers-5c4b9d54d9-thmd5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:32:49.162660 env[1215]: 2025-05-14 00:32:49.142 [INFO][4255] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ff33878e40 ContainerID="efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" Namespace="calico-system" Pod="calico-kube-controllers-5c4b9d54d9-thmd5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:32:49.162660 env[1215]: 2025-05-14 00:32:49.145 [INFO][4255] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" Namespace="calico-system" Pod="calico-kube-controllers-5c4b9d54d9-thmd5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:32:49.162660 env[1215]: 2025-05-14 00:32:49.149 [INFO][4255] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" Namespace="calico-system" Pod="calico-kube-controllers-5c4b9d54d9-thmd5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0", GenerateName:"calico-kube-controllers-5c4b9d54d9-", Namespace:"calico-system", SelfLink:"", UID:"9e88214d-945e-4dec-b917-4e940f481988", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c4b9d54d9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd", Pod:"calico-kube-controllers-5c4b9d54d9-thmd5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5ff33878e40", MAC:"1e:8b:61:54:1b:53", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:49.162660 env[1215]: 2025-05-14 00:32:49.159 [INFO][4255] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd" Namespace="calico-system" Pod="calico-kube-controllers-5c4b9d54d9-thmd5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:32:49.174000 audit[4295]: NETFILTER_CFG table=filter:113 family=2 entries=46 op=nft_register_chain pid=4295 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:32:49.174000 audit[4295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22696 a0=3 a1=ffffeda882a0 a2=0 a3=ffffb53cbfa8 items=0 ppid=3356 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:49.174000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:32:49.180084 env[1215]: time="2025-05-14T00:32:49.179846241Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:32:49.180084 env[1215]: time="2025-05-14T00:32:49.179891761Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:32:49.180084 env[1215]: time="2025-05-14T00:32:49.179901921Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:32:49.180084 env[1215]: time="2025-05-14T00:32:49.180025641Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd pid=4304 runtime=io.containerd.runc.v2 May 14 00:32:49.196272 systemd[1]: run-containerd-runc-k8s.io-efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd-runc.ULbZT4.mount: Deactivated successfully. May 14 00:32:49.205184 systemd[1]: Started cri-containerd-efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd.scope. May 14 00:32:49.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.232000 audit: BPF prog-id=193 op=LOAD May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4304 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:49.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626464313334323364323864646562303362313162316466646663 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4304 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:49.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626464313334323364323864646562303362313162316466646663 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit: BPF prog-id=194 op=LOAD May 14 00:32:49.233000 audit[4312]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4304 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:49.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626464313334323364323864646562303362313162316466646663 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit: BPF prog-id=195 op=LOAD May 14 00:32:49.233000 audit[4312]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4304 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:49.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626464313334323364323864646562303362313162316466646663 May 14 00:32:49.233000 audit: BPF prog-id=195 op=UNLOAD May 14 00:32:49.233000 audit: BPF prog-id=194 op=UNLOAD May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:49.233000 audit: BPF prog-id=196 op=LOAD May 14 00:32:49.233000 audit[4312]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4304 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:49.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626464313334323364323864646562303362313162316466646663 May 14 00:32:49.236154 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:32:49.256767 env[1215]: time="2025-05-14T00:32:49.256731220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c4b9d54d9-thmd5,Uid:9e88214d-945e-4dec-b917-4e940f481988,Namespace:calico-system,Attempt:1,} returns sandbox id \"efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd\"" May 14 00:32:49.258518 env[1215]: time="2025-05-14T00:32:49.258479574Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 14 00:32:49.886425 env[1215]: time="2025-05-14T00:32:49.886386242Z" level=info msg="StopPodSandbox for \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\"" May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.944 [INFO][4359] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.944 [INFO][4359] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" iface="eth0" netns="/var/run/netns/cni-2c4ec333-1700-aacd-8822-740c43996e40" May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.944 [INFO][4359] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" iface="eth0" netns="/var/run/netns/cni-2c4ec333-1700-aacd-8822-740c43996e40" May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.944 [INFO][4359] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" iface="eth0" netns="/var/run/netns/cni-2c4ec333-1700-aacd-8822-740c43996e40" May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.944 [INFO][4359] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.944 [INFO][4359] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.973 [INFO][4368] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" HandleID="k8s-pod-network.d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.973 [INFO][4368] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.973 [INFO][4368] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.981 [WARNING][4368] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" HandleID="k8s-pod-network.d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.981 [INFO][4368] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" HandleID="k8s-pod-network.d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.983 [INFO][4368] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:49.986750 env[1215]: 2025-05-14 00:32:49.985 [INFO][4359] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:32:49.987254 env[1215]: time="2025-05-14T00:32:49.986922941Z" level=info msg="TearDown network for sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\" successfully" May 14 00:32:49.987254 env[1215]: time="2025-05-14T00:32:49.986964621Z" level=info msg="StopPodSandbox for \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\" returns successfully" May 14 00:32:49.987843 env[1215]: time="2025-05-14T00:32:49.987812338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-95cpg,Uid:3e285113-a129-4a13-ae7d-6cc2fd3ed9b8,Namespace:calico-system,Attempt:1,}" May 14 00:32:49.989165 systemd[1]: run-netns-cni\x2d2c4ec333\x2d1700\x2daacd\x2d8822\x2d740c43996e40.mount: Deactivated successfully. May 14 00:32:50.061867 kubelet[2059]: I0514 00:32:50.061770 2059 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:32:50.061867 kubelet[2059]: I0514 00:32:50.061770 2059 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:32:50.062385 kubelet[2059]: E0514 00:32:50.062264 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:32:50.067997 systemd[1]: Started sshd@13-10.0.0.19:22-10.0.0.1:42150.service. May 14 00:32:50.072009 kernel: kauditd_printk_skb: 553 callbacks suppressed May 14 00:32:50.072103 kernel: audit: type=1130 audit(1747182770.067:1348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.19:22-10.0.0.1:42150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:50.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.19:22-10.0.0.1:42150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:50.133000 audit[4399]: USER_ACCT pid=4399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:50.145815 kernel: audit: type=1101 audit(1747182770.133:1349): pid=4399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:50.145909 kernel: audit: type=1103 audit(1747182770.133:1350): pid=4399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:50.145933 kernel: audit: type=1006 audit(1747182770.133:1351): pid=4399 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 14 00:32:50.133000 audit[4399]: CRED_ACQ pid=4399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:50.137828 sshd[4399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:32:50.146959 sshd[4399]: Accepted publickey for core from 10.0.0.1 port 42150 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:32:50.133000 audit[4399]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7c3d510 a2=3 a3=1 items=0 ppid=1 pid=4399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:50.154512 kernel: audit: type=1300 audit(1747182770.133:1351): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7c3d510 a2=3 a3=1 items=0 ppid=1 pid=4399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:50.133000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:32:50.156090 kernel: audit: type=1327 audit(1747182770.133:1351): proctitle=737368643A20636F7265205B707269765D May 14 00:32:50.160665 systemd-logind[1202]: New session 14 of user core. May 14 00:32:50.163499 systemd[1]: Started session-14.scope. May 14 00:32:50.170000 audit[4399]: USER_START pid=4399 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:50.170000 audit[4404]: CRED_ACQ pid=4404 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:50.179864 kernel: audit: type=1105 audit(1747182770.170:1352): pid=4399 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:50.179940 kernel: audit: type=1103 audit(1747182770.170:1353): pid=4404 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:50.189695 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:32:50.189810 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calife93a79d3be: link becomes ready May 14 00:32:50.189760 systemd-networkd[1040]: calife93a79d3be: Link UP May 14 00:32:50.189981 systemd-networkd[1040]: calife93a79d3be: Gained carrier May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.032 [INFO][4376] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--95cpg-eth0 csi-node-driver- calico-system 3e285113-a129-4a13-ae7d-6cc2fd3ed9b8 957 0 2025-05-14 00:32:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-95cpg eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calife93a79d3be [] []}} ContainerID="da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" Namespace="calico-system" Pod="csi-node-driver-95cpg" WorkloadEndpoint="localhost-k8s-csi--node--driver--95cpg-" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.033 [INFO][4376] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" Namespace="calico-system" Pod="csi-node-driver-95cpg" WorkloadEndpoint="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.084 [INFO][4392] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" HandleID="k8s-pod-network.da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.121 [INFO][4392] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" HandleID="k8s-pod-network.da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40005849e0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-95cpg", "timestamp":"2025-05-14 00:32:50.084838974 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.121 [INFO][4392] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.121 [INFO][4392] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.121 [INFO][4392] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.126 [INFO][4392] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" host="localhost" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.130 [INFO][4392] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.139 [INFO][4392] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.142 [INFO][4392] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.147 [INFO][4392] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.147 [INFO][4392] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" host="localhost" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.170 [INFO][4392] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.176 [INFO][4392] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" host="localhost" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.183 [INFO][4392] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" host="localhost" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.183 [INFO][4392] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" host="localhost" May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.183 [INFO][4392] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:32:50.206577 env[1215]: 2025-05-14 00:32:50.183 [INFO][4392] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" HandleID="k8s-pod-network.da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:32:50.207234 env[1215]: 2025-05-14 00:32:50.186 [INFO][4376] cni-plugin/k8s.go 386: Populated endpoint ContainerID="da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" Namespace="calico-system" Pod="csi-node-driver-95cpg" WorkloadEndpoint="localhost-k8s-csi--node--driver--95cpg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--95cpg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3e285113-a129-4a13-ae7d-6cc2fd3ed9b8", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-95cpg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calife93a79d3be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:50.207234 env[1215]: 2025-05-14 00:32:50.186 [INFO][4376] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" Namespace="calico-system" Pod="csi-node-driver-95cpg" WorkloadEndpoint="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:32:50.207234 env[1215]: 2025-05-14 00:32:50.186 [INFO][4376] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calife93a79d3be ContainerID="da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" Namespace="calico-system" Pod="csi-node-driver-95cpg" WorkloadEndpoint="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:32:50.207234 env[1215]: 2025-05-14 00:32:50.190 [INFO][4376] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" Namespace="calico-system" Pod="csi-node-driver-95cpg" WorkloadEndpoint="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:32:50.207234 env[1215]: 2025-05-14 00:32:50.190 [INFO][4376] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" Namespace="calico-system" Pod="csi-node-driver-95cpg" WorkloadEndpoint="localhost-k8s-csi--node--driver--95cpg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--95cpg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3e285113-a129-4a13-ae7d-6cc2fd3ed9b8", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e", Pod:"csi-node-driver-95cpg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calife93a79d3be", MAC:"4e:a5:a7:fc:52:74", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:32:50.207234 env[1215]: 2025-05-14 00:32:50.203 [INFO][4376] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e" Namespace="calico-system" Pod="csi-node-driver-95cpg" WorkloadEndpoint="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:32:50.229000 audit[4421]: NETFILTER_CFG table=filter:114 family=2 entries=46 op=nft_register_chain pid=4421 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:32:50.229000 audit[4421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22188 a0=3 a1=ffffda8af3b0 a2=0 a3=ffff9d364fa8 items=0 ppid=3356 pid=4421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:50.238622 kernel: audit: type=1325 audit(1747182770.229:1354): table=filter:114 family=2 entries=46 op=nft_register_chain pid=4421 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:32:50.238695 kernel: audit: type=1300 audit(1747182770.229:1354): arch=c00000b7 syscall=211 success=yes exit=22188 a0=3 a1=ffffda8af3b0 a2=0 a3=ffff9d364fa8 items=0 ppid=3356 pid=4421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:50.229000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:32:50.252114 env[1215]: time="2025-05-14T00:32:50.251007860Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:32:50.252114 env[1215]: time="2025-05-14T00:32:50.251212299Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:32:50.252114 env[1215]: time="2025-05-14T00:32:50.251244459Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:32:50.252303 env[1215]: time="2025-05-14T00:32:50.252174656Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e pid=4435 runtime=io.containerd.runc.v2 May 14 00:32:50.280117 systemd[1]: Started cri-containerd-da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e.scope. May 14 00:32:50.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.330000 audit: BPF prog-id=197 op=LOAD May 14 00:32:50.331000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.331000 audit[4444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4435 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:50.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461343165346134373630306334306332326261343738623364623163 May 14 00:32:50.331000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.331000 audit[4444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4435 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:50.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461343165346134373630306334306332326261343738623364623163 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit: BPF prog-id=198 op=LOAD May 14 00:32:50.332000 audit[4444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4435 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:50.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461343165346134373630306334306332326261343738623364623163 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.332000 audit: BPF prog-id=199 op=LOAD May 14 00:32:50.332000 audit[4444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4435 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:50.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461343165346134373630306334306332326261343738623364623163 May 14 00:32:50.333000 audit: BPF prog-id=199 op=UNLOAD May 14 00:32:50.333000 audit: BPF prog-id=198 op=UNLOAD May 14 00:32:50.333000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.333000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.333000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.333000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.333000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.333000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.333000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.333000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.333000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.333000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:50.333000 audit: BPF prog-id=200 op=LOAD May 14 00:32:50.333000 audit[4444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4435 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:50.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461343165346134373630306334306332326261343738623364623163 May 14 00:32:50.335841 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:32:50.339943 systemd-networkd[1040]: cali5ff33878e40: Gained IPv6LL May 14 00:32:50.374850 env[1215]: time="2025-05-14T00:32:50.374799367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-95cpg,Uid:3e285113-a129-4a13-ae7d-6cc2fd3ed9b8,Namespace:calico-system,Attempt:1,} returns sandbox id \"da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e\"" May 14 00:32:50.421385 sshd[4399]: pam_unix(sshd:session): session closed for user core May 14 00:32:50.421000 audit[4399]: USER_END pid=4399 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:50.422000 audit[4399]: CRED_DISP pid=4399 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:50.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.19:22-10.0.0.1:42150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:50.427003 systemd[1]: sshd@13-10.0.0.19:22-10.0.0.1:42150.service: Deactivated successfully. May 14 00:32:50.427744 systemd[1]: session-14.scope: Deactivated successfully. May 14 00:32:50.428586 systemd-logind[1202]: Session 14 logged out. Waiting for processes to exit. May 14 00:32:50.429345 systemd-logind[1202]: Removed session 14. May 14 00:32:50.834000 audit[4218]: AVC avc: denied { watch } for pid=4218 comm="apiserver" path="/calico-apiserver-certs/..2025_05_14_00_32_33.2435959528/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c621,c766 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c621,c766 tclass=file permissive=0 May 14 00:32:50.834000 audit[4218]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000ed75a0 a2=fc6 a3=0 items=0 ppid=4064 pid=4218 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c621,c766 key=(null) May 14 00:32:50.834000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 14 00:32:51.046000 audit[4167]: AVC avc: denied { watch } for pid=4167 comm="apiserver" path="/calico-apiserver-certs/..2025_05_14_00_32_33.907575898/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c666 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c521,c666 tclass=file permissive=0 May 14 00:32:51.046000 audit[4167]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000e64000 a2=fc6 a3=0 items=0 ppid=3743 pid=4167 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c666 key=(null) May 14 00:32:51.046000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 14 00:32:51.060930 env[1215]: time="2025-05-14T00:32:51.060883803Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:51.063288 env[1215]: time="2025-05-14T00:32:51.063262315Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:51.065055 env[1215]: time="2025-05-14T00:32:51.065018710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:51.066923 env[1215]: time="2025-05-14T00:32:51.066894464Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:51.067411 env[1215]: time="2025-05-14T00:32:51.067380702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 14 00:32:51.070316 env[1215]: time="2025-05-14T00:32:51.070058853Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 14 00:32:51.079793 env[1215]: time="2025-05-14T00:32:51.079740301Z" level=info msg="CreateContainer within sandbox \"efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 14 00:32:51.170666 env[1215]: time="2025-05-14T00:32:51.170625044Z" level=info msg="CreateContainer within sandbox \"efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7999f34d3ab8118ad06a38edab1c7267d8661d236ed014cde0e3701c2908a27e\"" May 14 00:32:51.171609 env[1215]: time="2025-05-14T00:32:51.171580281Z" level=info msg="StartContainer for \"7999f34d3ab8118ad06a38edab1c7267d8661d236ed014cde0e3701c2908a27e\"" May 14 00:32:51.192460 systemd[1]: Started cri-containerd-7999f34d3ab8118ad06a38edab1c7267d8661d236ed014cde0e3701c2908a27e.scope. May 14 00:32:51.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.226000 audit: BPF prog-id=201 op=LOAD May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4304 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:51.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739393966333464336162383131386164303661333865646162316337 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4304 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:51.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739393966333464336162383131386164303661333865646162316337 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit: BPF prog-id=202 op=LOAD May 14 00:32:51.227000 audit[4484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4304 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:51.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739393966333464336162383131386164303661333865646162316337 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit: BPF prog-id=203 op=LOAD May 14 00:32:51.227000 audit[4484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4304 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:51.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739393966333464336162383131386164303661333865646162316337 May 14 00:32:51.227000 audit: BPF prog-id=203 op=UNLOAD May 14 00:32:51.227000 audit: BPF prog-id=202 op=UNLOAD May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.227000 audit: BPF prog-id=204 op=LOAD May 14 00:32:51.227000 audit[4484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4304 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:51.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739393966333464336162383131386164303661333865646162316337 May 14 00:32:51.306081 env[1215]: time="2025-05-14T00:32:51.305987640Z" level=info msg="StartContainer for \"7999f34d3ab8118ad06a38edab1c7267d8661d236ed014cde0e3701c2908a27e\" returns successfully" May 14 00:32:51.618952 systemd-networkd[1040]: calife93a79d3be: Gained IPv6LL May 14 00:32:51.937901 env[1215]: time="2025-05-14T00:32:51.937837691Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:51.939594 env[1215]: time="2025-05-14T00:32:51.939549325Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:51.941393 env[1215]: time="2025-05-14T00:32:51.941356999Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:51.942831 env[1215]: time="2025-05-14T00:32:51.942801874Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:51.943293 env[1215]: time="2025-05-14T00:32:51.943255433Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 14 00:32:51.946033 env[1215]: time="2025-05-14T00:32:51.945993024Z" level=info msg="CreateContainer within sandbox \"da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 14 00:32:51.957622 env[1215]: time="2025-05-14T00:32:51.957579666Z" level=info msg="CreateContainer within sandbox \"da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"62ca449bdaa7189df6b5c192f846e4426966c8bacaf1d44b35e5563ffcda007a\"" May 14 00:32:51.958118 env[1215]: time="2025-05-14T00:32:51.958066864Z" level=info msg="StartContainer for \"62ca449bdaa7189df6b5c192f846e4426966c8bacaf1d44b35e5563ffcda007a\"" May 14 00:32:51.972614 systemd[1]: Started cri-containerd-62ca449bdaa7189df6b5c192f846e4426966c8bacaf1d44b35e5563ffcda007a.scope. May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400018d5a0 a2=3c a3=0 items=0 ppid=4435 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:51.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632636134343962646161373138396466366235633139326638343665 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit: BPF prog-id=205 op=LOAD May 14 00:32:51.995000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400018d8e0 a2=78 a3=0 items=0 ppid=4435 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:51.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632636134343962646161373138396466366235633139326638343665 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit: BPF prog-id=206 op=LOAD May 14 00:32:51.995000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400018d670 a2=78 a3=0 items=0 ppid=4435 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:51.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632636134343962646161373138396466366235633139326638343665 May 14 00:32:51.995000 audit: BPF prog-id=206 op=UNLOAD May 14 00:32:51.995000 audit: BPF prog-id=205 op=UNLOAD May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:51.995000 audit: BPF prog-id=207 op=LOAD May 14 00:32:51.995000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400018db40 a2=78 a3=0 items=0 ppid=4435 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:51.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632636134343962646161373138396466366235633139326638343665 May 14 00:32:52.014182 env[1215]: time="2025-05-14T00:32:52.014139201Z" level=info msg="StartContainer for \"62ca449bdaa7189df6b5c192f846e4426966c8bacaf1d44b35e5563ffcda007a\" returns successfully" May 14 00:32:52.015396 env[1215]: time="2025-05-14T00:32:52.015359997Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 14 00:32:52.084380 kubelet[2059]: I0514 00:32:52.084308 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5c4b9d54d9-thmd5" podStartSLOduration=25.272617657 podStartE2EDuration="27.084293735s" podCreationTimestamp="2025-05-14 00:32:25 +0000 UTC" firstStartedPulling="2025-05-14 00:32:49.257978616 +0000 UTC m=+47.475434667" lastFinishedPulling="2025-05-14 00:32:51.069654654 +0000 UTC m=+49.287110745" observedRunningTime="2025-05-14 00:32:52.083994736 +0000 UTC m=+50.301450787" watchObservedRunningTime="2025-05-14 00:32:52.084293735 +0000 UTC m=+50.301749786" May 14 00:32:52.095097 systemd[1]: run-containerd-runc-k8s.io-7999f34d3ab8118ad06a38edab1c7267d8661d236ed014cde0e3701c2908a27e-runc.oo8cse.mount: Deactivated successfully. May 14 00:32:53.191318 env[1215]: time="2025-05-14T00:32:53.191278019Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:53.193451 env[1215]: time="2025-05-14T00:32:53.193406492Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:53.194727 env[1215]: time="2025-05-14T00:32:53.194696448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:53.196082 env[1215]: time="2025-05-14T00:32:53.196058964Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:32:53.196470 env[1215]: time="2025-05-14T00:32:53.196444163Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 14 00:32:53.199184 env[1215]: time="2025-05-14T00:32:53.199152514Z" level=info msg="CreateContainer within sandbox \"da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 14 00:32:53.219991 env[1215]: time="2025-05-14T00:32:53.219949328Z" level=info msg="CreateContainer within sandbox \"da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ecb60589281a4747c13c71d88ce13b29fe369e86678a396b27ddb09ac98d64df\"" May 14 00:32:53.220648 env[1215]: time="2025-05-14T00:32:53.220625006Z" level=info msg="StartContainer for \"ecb60589281a4747c13c71d88ce13b29fe369e86678a396b27ddb09ac98d64df\"" May 14 00:32:53.241853 systemd[1]: Started cri-containerd-ecb60589281a4747c13c71d88ce13b29fe369e86678a396b27ddb09ac98d64df.scope. May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4435 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:53.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623630353839323831613437343763313363373164383863653133 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit: BPF prog-id=208 op=LOAD May 14 00:32:53.275000 audit[4582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4435 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:53.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623630353839323831613437343763313363373164383863653133 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit: BPF prog-id=209 op=LOAD May 14 00:32:53.275000 audit[4582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4435 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:53.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623630353839323831613437343763313363373164383863653133 May 14 00:32:53.275000 audit: BPF prog-id=209 op=UNLOAD May 14 00:32:53.275000 audit: BPF prog-id=208 op=UNLOAD May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:32:53.275000 audit: BPF prog-id=210 op=LOAD May 14 00:32:53.275000 audit[4582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4435 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:53.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623630353839323831613437343763313363373164383863653133 May 14 00:32:53.290404 env[1215]: time="2025-05-14T00:32:53.290359225Z" level=info msg="StartContainer for \"ecb60589281a4747c13c71d88ce13b29fe369e86678a396b27ddb09ac98d64df\" returns successfully" May 14 00:32:53.946229 kubelet[2059]: I0514 00:32:53.946183 2059 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 14 00:32:53.948858 kubelet[2059]: I0514 00:32:53.948837 2059 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 14 00:32:54.089587 kubelet[2059]: I0514 00:32:54.089533 2059 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-95cpg" podStartSLOduration=26.268346218 podStartE2EDuration="29.089518255s" podCreationTimestamp="2025-05-14 00:32:25 +0000 UTC" firstStartedPulling="2025-05-14 00:32:50.376290842 +0000 UTC m=+48.593746893" lastFinishedPulling="2025-05-14 00:32:53.197462879 +0000 UTC m=+51.414918930" observedRunningTime="2025-05-14 00:32:54.089144497 +0000 UTC m=+52.306600548" watchObservedRunningTime="2025-05-14 00:32:54.089518255 +0000 UTC m=+52.306974306" May 14 00:32:55.425368 systemd[1]: Started sshd@14-10.0.0.19:22-10.0.0.1:58842.service. May 14 00:32:55.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.19:22-10.0.0.1:58842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:55.426535 kernel: kauditd_printk_skb: 210 callbacks suppressed May 14 00:32:55.426595 kernel: audit: type=1130 audit(1747182775.424:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.19:22-10.0.0.1:58842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:55.475000 audit[4617]: USER_ACCT pid=4617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.476959 sshd[4617]: Accepted publickey for core from 10.0.0.1 port 58842 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:32:55.478377 sshd[4617]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:32:55.477000 audit[4617]: CRED_ACQ pid=4617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.483136 kernel: audit: type=1101 audit(1747182775.475:1409): pid=4617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.483202 kernel: audit: type=1103 audit(1747182775.477:1410): pid=4617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.485710 kernel: audit: type=1006 audit(1747182775.477:1411): pid=4617 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 14 00:32:55.477000 audit[4617]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc28e710 a2=3 a3=1 items=0 ppid=1 pid=4617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:55.489899 kernel: audit: type=1300 audit(1747182775.477:1411): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc28e710 a2=3 a3=1 items=0 ppid=1 pid=4617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:32:55.477000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:32:55.491415 kernel: audit: type=1327 audit(1747182775.477:1411): proctitle=737368643A20636F7265205B707269765D May 14 00:32:55.492076 systemd-logind[1202]: New session 15 of user core. May 14 00:32:55.492526 systemd[1]: Started session-15.scope. May 14 00:32:55.495000 audit[4617]: USER_START pid=4617 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.496000 audit[4619]: CRED_ACQ pid=4619 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.503707 kernel: audit: type=1105 audit(1747182775.495:1412): pid=4617 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.503772 kernel: audit: type=1103 audit(1747182775.496:1413): pid=4619 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.657834 sshd[4617]: pam_unix(sshd:session): session closed for user core May 14 00:32:55.657000 audit[4617]: USER_END pid=4617 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.661008 systemd[1]: sshd@14-10.0.0.19:22-10.0.0.1:58842.service: Deactivated successfully. May 14 00:32:55.661749 systemd[1]: session-15.scope: Deactivated successfully. May 14 00:32:55.658000 audit[4617]: CRED_DISP pid=4617 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.665464 kernel: audit: type=1106 audit(1747182775.657:1414): pid=4617 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.665558 kernel: audit: type=1104 audit(1747182775.658:1415): pid=4617 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:32:55.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.19:22-10.0.0.1:58842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:32:55.666096 systemd-logind[1202]: Session 15 logged out. Waiting for processes to exit. May 14 00:32:55.666827 systemd-logind[1202]: Removed session 15. May 14 00:32:59.589000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:59.589000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400e441e00 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:32:59.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:32:59.589000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:59.589000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=40113a4f00 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:32:59.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:32:59.589000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:59.589000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400ec7f0e0 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:32:59.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:32:59.590000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:59.590000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400ecc01c0 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:32:59.590000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:32:59.590000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:59.590000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=40113a4f60 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:32:59.590000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:32:59.599000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:32:59.599000 audit[1941]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400e49cb60 a2=fc6 a3=0 items=0 ppid=1777 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c354 key=(null) May 14 00:32:59.599000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:33:00.663095 systemd[1]: Started sshd@15-10.0.0.19:22-10.0.0.1:58854.service. May 14 00:33:00.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.19:22-10.0.0.1:58854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:00.663918 kernel: kauditd_printk_skb: 19 callbacks suppressed May 14 00:33:00.663981 kernel: audit: type=1130 audit(1747182780.662:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.19:22-10.0.0.1:58854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:00.704000 audit[4634]: USER_ACCT pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.705797 sshd[4634]: Accepted publickey for core from 10.0.0.1 port 58854 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:33:00.706690 sshd[4634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:33:00.705000 audit[4634]: CRED_ACQ pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.710983 systemd-logind[1202]: New session 16 of user core. May 14 00:33:00.711468 kernel: audit: type=1101 audit(1747182780.704:1424): pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.711496 kernel: audit: type=1103 audit(1747182780.705:1425): pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.711516 kernel: audit: type=1006 audit(1747182780.705:1426): pid=4634 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 14 00:33:00.711847 systemd[1]: Started session-16.scope. May 14 00:33:00.705000 audit[4634]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff76c4b20 a2=3 a3=1 items=0 ppid=1 pid=4634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:00.716386 kernel: audit: type=1300 audit(1747182780.705:1426): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff76c4b20 a2=3 a3=1 items=0 ppid=1 pid=4634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:00.705000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:33:00.717693 kernel: audit: type=1327 audit(1747182780.705:1426): proctitle=737368643A20636F7265205B707269765D May 14 00:33:00.717753 kernel: audit: type=1105 audit(1747182780.716:1427): pid=4634 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.716000 audit[4634]: USER_START pid=4634 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.717000 audit[4636]: CRED_ACQ pid=4636 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.723902 kernel: audit: type=1103 audit(1747182780.717:1428): pid=4636 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.725000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:33:00.725000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40037a2e40 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:33:00.732874 kernel: audit: type=1400 audit(1747182780.725:1429): avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:33:00.732926 kernel: audit: type=1300 audit(1747182780.725:1429): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40037a2e40 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:33:00.725000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:33:00.725000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:33:00.725000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400357b8f0 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:33:00.725000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:33:00.839888 sshd[4634]: pam_unix(sshd:session): session closed for user core May 14 00:33:00.841000 audit[4634]: USER_END pid=4634 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.841000 audit[4634]: CRED_DISP pid=4634 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.844179 systemd[1]: Started sshd@16-10.0.0.19:22-10.0.0.1:58862.service. May 14 00:33:00.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.19:22-10.0.0.1:58862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:00.844822 systemd[1]: sshd@15-10.0.0.19:22-10.0.0.1:58854.service: Deactivated successfully. May 14 00:33:00.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.19:22-10.0.0.1:58854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:00.845519 systemd[1]: session-16.scope: Deactivated successfully. May 14 00:33:00.846129 systemd-logind[1202]: Session 16 logged out. Waiting for processes to exit. May 14 00:33:00.847063 systemd-logind[1202]: Removed session 16. May 14 00:33:00.887000 audit[4646]: USER_ACCT pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.888919 sshd[4646]: Accepted publickey for core from 10.0.0.1 port 58862 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:33:00.888000 audit[4646]: CRED_ACQ pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.888000 audit[4646]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7a90750 a2=3 a3=1 items=0 ppid=1 pid=4646 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:00.888000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:33:00.889883 sshd[4646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:33:00.892734 systemd-logind[1202]: New session 17 of user core. May 14 00:33:00.893522 systemd[1]: Started session-17.scope. May 14 00:33:00.895000 audit[4646]: USER_START pid=4646 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:00.896000 audit[4649]: CRED_ACQ pid=4649 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:01.118866 sshd[4646]: pam_unix(sshd:session): session closed for user core May 14 00:33:01.118000 audit[4646]: USER_END pid=4646 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:01.119000 audit[4646]: CRED_DISP pid=4646 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:01.122667 systemd[1]: Started sshd@17-10.0.0.19:22-10.0.0.1:58864.service. May 14 00:33:01.123232 systemd[1]: sshd@16-10.0.0.19:22-10.0.0.1:58862.service: Deactivated successfully. May 14 00:33:01.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.19:22-10.0.0.1:58864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:01.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.19:22-10.0.0.1:58862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:01.123964 systemd[1]: session-17.scope: Deactivated successfully. May 14 00:33:01.124529 systemd-logind[1202]: Session 17 logged out. Waiting for processes to exit. May 14 00:33:01.125669 systemd-logind[1202]: Removed session 17. May 14 00:33:01.165000 audit[4658]: USER_ACCT pid=4658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:01.166726 sshd[4658]: Accepted publickey for core from 10.0.0.1 port 58864 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:33:01.166000 audit[4658]: CRED_ACQ pid=4658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:01.166000 audit[4658]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7da7e50 a2=3 a3=1 items=0 ppid=1 pid=4658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:01.166000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:33:01.167835 sshd[4658]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:33:01.171129 systemd-logind[1202]: New session 18 of user core. May 14 00:33:01.172029 systemd[1]: Started session-18.scope. May 14 00:33:01.175000 audit[4658]: USER_START pid=4658 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:01.176000 audit[4661]: CRED_ACQ pid=4661 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:01.279255 systemd[1]: run-containerd-runc-k8s.io-1157db1c33824292641d4a4f799837eb14c5cd6d2b9f60d890a71df1e48c2805-runc.mqrowh.mount: Deactivated successfully. May 14 00:33:01.334446 kubelet[2059]: E0514 00:33:01.334408 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:33:01.868640 env[1215]: time="2025-05-14T00:33:01.868600757Z" level=info msg="StopPodSandbox for \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\"" May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.908 [WARNING][4718] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0", GenerateName:"calico-apiserver-6bc974fd89-", Namespace:"calico-apiserver", SelfLink:"", UID:"6ad9fc77-4e30-476a-a258-873ab0a4feaa", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bc974fd89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532", Pod:"calico-apiserver-6bc974fd89-kqxn2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali244c5524f1a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.908 [INFO][4718] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.908 [INFO][4718] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" iface="eth0" netns="" May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.908 [INFO][4718] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.908 [INFO][4718] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.932 [INFO][4728] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" HandleID="k8s-pod-network.ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.932 [INFO][4728] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.932 [INFO][4728] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.940 [WARNING][4728] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" HandleID="k8s-pod-network.ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.940 [INFO][4728] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" HandleID="k8s-pod-network.ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.942 [INFO][4728] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:01.945185 env[1215]: 2025-05-14 00:33:01.943 [INFO][4718] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:33:01.945622 env[1215]: time="2025-05-14T00:33:01.945212178Z" level=info msg="TearDown network for sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\" successfully" May 14 00:33:01.945622 env[1215]: time="2025-05-14T00:33:01.945241898Z" level=info msg="StopPodSandbox for \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\" returns successfully" May 14 00:33:01.945790 env[1215]: time="2025-05-14T00:33:01.945738937Z" level=info msg="RemovePodSandbox for \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\"" May 14 00:33:01.945839 env[1215]: time="2025-05-14T00:33:01.945771657Z" level=info msg="Forcibly stopping sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\"" May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:01.978 [WARNING][4750] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0", GenerateName:"calico-apiserver-6bc974fd89-", Namespace:"calico-apiserver", SelfLink:"", UID:"6ad9fc77-4e30-476a-a258-873ab0a4feaa", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bc974fd89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4d90412458ef24b491620813a80c62c29b8091125d8650e1422b71ecebced532", Pod:"calico-apiserver-6bc974fd89-kqxn2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali244c5524f1a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:01.979 [INFO][4750] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:01.979 [INFO][4750] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" iface="eth0" netns="" May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:01.979 [INFO][4750] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:01.979 [INFO][4750] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:02.005 [INFO][4759] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" HandleID="k8s-pod-network.ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:02.005 [INFO][4759] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:02.005 [INFO][4759] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:02.013 [WARNING][4759] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" HandleID="k8s-pod-network.ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:02.013 [INFO][4759] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" HandleID="k8s-pod-network.ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" Workload="localhost-k8s-calico--apiserver--6bc974fd89--kqxn2-eth0" May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:02.014 [INFO][4759] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:02.017829 env[1215]: 2025-05-14 00:33:02.016 [INFO][4750] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1" May 14 00:33:02.018309 env[1215]: time="2025-05-14T00:33:02.017839531Z" level=info msg="TearDown network for sandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\" successfully" May 14 00:33:02.028804 env[1215]: time="2025-05-14T00:33:02.028745580Z" level=info msg="RemovePodSandbox \"ff9f1133db1de99294447a59560c90f2d6b6342e7e0134d40b5c006622f254b1\" returns successfully" May 14 00:33:02.029332 env[1215]: time="2025-05-14T00:33:02.029291818Z" level=info msg="StopPodSandbox for \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\"" May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.102 [WARNING][4783] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"da26cad3-09a9-45d7-9357-120de1647d0a", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221", Pod:"coredns-7db6d8ff4d-lcx2j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d6e41ba56e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.102 [INFO][4783] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.102 [INFO][4783] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" iface="eth0" netns="" May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.102 [INFO][4783] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.102 [INFO][4783] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.121 [INFO][4793] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" HandleID="k8s-pod-network.73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.121 [INFO][4793] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.121 [INFO][4793] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.133 [WARNING][4793] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" HandleID="k8s-pod-network.73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.133 [INFO][4793] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" HandleID="k8s-pod-network.73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.134 [INFO][4793] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:02.137966 env[1215]: 2025-05-14 00:33:02.136 [INFO][4783] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:33:02.138392 env[1215]: time="2025-05-14T00:33:02.137996230Z" level=info msg="TearDown network for sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\" successfully" May 14 00:33:02.138392 env[1215]: time="2025-05-14T00:33:02.138033950Z" level=info msg="StopPodSandbox for \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\" returns successfully" May 14 00:33:02.138688 env[1215]: time="2025-05-14T00:33:02.138628588Z" level=info msg="RemovePodSandbox for \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\"" May 14 00:33:02.138788 env[1215]: time="2025-05-14T00:33:02.138689588Z" level=info msg="Forcibly stopping sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\"" May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.198 [WARNING][4816] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"da26cad3-09a9-45d7-9357-120de1647d0a", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cf1bd7b9d9316a7926d10ab671f8da26868322242b62ec64b4cb17fbcbb72221", Pod:"coredns-7db6d8ff4d-lcx2j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d6e41ba56e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.198 [INFO][4816] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.198 [INFO][4816] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" iface="eth0" netns="" May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.198 [INFO][4816] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.198 [INFO][4816] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.226 [INFO][4824] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" HandleID="k8s-pod-network.73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.226 [INFO][4824] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.226 [INFO][4824] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.235 [WARNING][4824] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" HandleID="k8s-pod-network.73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.235 [INFO][4824] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" HandleID="k8s-pod-network.73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" Workload="localhost-k8s-coredns--7db6d8ff4d--lcx2j-eth0" May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.236 [INFO][4824] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:02.239878 env[1215]: 2025-05-14 00:33:02.238 [INFO][4816] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985" May 14 00:33:02.240339 env[1215]: time="2025-05-14T00:33:02.239899061Z" level=info msg="TearDown network for sandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\" successfully" May 14 00:33:02.246566 env[1215]: time="2025-05-14T00:33:02.246514963Z" level=info msg="RemovePodSandbox \"73a5833f5da2f9f23bf95decb75b00b2fe1a000a88950f178f693569dce05985\" returns successfully" May 14 00:33:02.247028 env[1215]: time="2025-05-14T00:33:02.246992881Z" level=info msg="StopPodSandbox for \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\"" May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.279 [WARNING][4847] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0", GenerateName:"calico-kube-controllers-5c4b9d54d9-", Namespace:"calico-system", SelfLink:"", UID:"9e88214d-945e-4dec-b917-4e940f481988", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c4b9d54d9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd", Pod:"calico-kube-controllers-5c4b9d54d9-thmd5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5ff33878e40", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.280 [INFO][4847] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.280 [INFO][4847] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" iface="eth0" netns="" May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.280 [INFO][4847] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.280 [INFO][4847] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.298 [INFO][4855] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" HandleID="k8s-pod-network.810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.298 [INFO][4855] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.298 [INFO][4855] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.306 [WARNING][4855] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" HandleID="k8s-pod-network.810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.306 [INFO][4855] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" HandleID="k8s-pod-network.810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.308 [INFO][4855] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:02.311061 env[1215]: 2025-05-14 00:33:02.309 [INFO][4847] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:33:02.311490 env[1215]: time="2025-05-14T00:33:02.311073900Z" level=info msg="TearDown network for sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\" successfully" May 14 00:33:02.311490 env[1215]: time="2025-05-14T00:33:02.311101900Z" level=info msg="StopPodSandbox for \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\" returns successfully" May 14 00:33:02.311535 env[1215]: time="2025-05-14T00:33:02.311509058Z" level=info msg="RemovePodSandbox for \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\"" May 14 00:33:02.311586 env[1215]: time="2025-05-14T00:33:02.311540658Z" level=info msg="Forcibly stopping sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\"" May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.353 [WARNING][4877] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0", GenerateName:"calico-kube-controllers-5c4b9d54d9-", Namespace:"calico-system", SelfLink:"", UID:"9e88214d-945e-4dec-b917-4e940f481988", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c4b9d54d9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"efbdd13423d28ddeb03b11b1dfdfc61d8f66e137b1946b2a4e24c61d8090befd", Pod:"calico-kube-controllers-5c4b9d54d9-thmd5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5ff33878e40", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.353 [INFO][4877] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.353 [INFO][4877] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" iface="eth0" netns="" May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.353 [INFO][4877] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.353 [INFO][4877] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.391 [INFO][4886] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" HandleID="k8s-pod-network.810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.392 [INFO][4886] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.392 [INFO][4886] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.400 [WARNING][4886] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" HandleID="k8s-pod-network.810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.400 [INFO][4886] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" HandleID="k8s-pod-network.810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" Workload="localhost-k8s-calico--kube--controllers--5c4b9d54d9--thmd5-eth0" May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.401 [INFO][4886] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:02.407435 env[1215]: 2025-05-14 00:33:02.405 [INFO][4877] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8" May 14 00:33:02.407435 env[1215]: time="2025-05-14T00:33:02.406852988Z" level=info msg="TearDown network for sandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\" successfully" May 14 00:33:02.411795 env[1215]: time="2025-05-14T00:33:02.411735294Z" level=info msg="RemovePodSandbox \"810dcaafc459a28d408f2c6a91cc5d846ebced9c6b6fd62f4c64b0a0ccbb81b8\" returns successfully" May 14 00:33:02.412309 env[1215]: time="2025-05-14T00:33:02.412283613Z" level=info msg="StopPodSandbox for \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\"" May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.464 [WARNING][4909] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"977cc417-1f5d-46d2-97d8-aba0cd1a31e5", ResourceVersion:"920", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e", Pod:"coredns-7db6d8ff4d-lrd4n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali210f76c3cb9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.464 [INFO][4909] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.464 [INFO][4909] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" iface="eth0" netns="" May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.464 [INFO][4909] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.464 [INFO][4909] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.484 [INFO][4918] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" HandleID="k8s-pod-network.34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.485 [INFO][4918] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.485 [INFO][4918] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.493 [WARNING][4918] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" HandleID="k8s-pod-network.34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.493 [INFO][4918] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" HandleID="k8s-pod-network.34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.494 [INFO][4918] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:02.502638 env[1215]: 2025-05-14 00:33:02.496 [INFO][4909] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:33:02.503387 env[1215]: time="2025-05-14T00:33:02.502669037Z" level=info msg="TearDown network for sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\" successfully" May 14 00:33:02.503387 env[1215]: time="2025-05-14T00:33:02.502699517Z" level=info msg="StopPodSandbox for \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\" returns successfully" May 14 00:33:02.503387 env[1215]: time="2025-05-14T00:33:02.503119475Z" level=info msg="RemovePodSandbox for \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\"" May 14 00:33:02.503387 env[1215]: time="2025-05-14T00:33:02.503148795Z" level=info msg="Forcibly stopping sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\"" May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.543 [WARNING][4943] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"977cc417-1f5d-46d2-97d8-aba0cd1a31e5", ResourceVersion:"920", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0833c0f8dd478b60aa5cd5f66229b1c12a6579009b7fe55c7b874b0134a65a0e", Pod:"coredns-7db6d8ff4d-lrd4n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali210f76c3cb9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.543 [INFO][4943] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.543 [INFO][4943] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" iface="eth0" netns="" May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.543 [INFO][4943] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.543 [INFO][4943] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.563 [INFO][4951] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" HandleID="k8s-pod-network.34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.564 [INFO][4951] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.564 [INFO][4951] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.573 [WARNING][4951] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" HandleID="k8s-pod-network.34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.573 [INFO][4951] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" HandleID="k8s-pod-network.34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" Workload="localhost-k8s-coredns--7db6d8ff4d--lrd4n-eth0" May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.574 [INFO][4951] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:02.578193 env[1215]: 2025-05-14 00:33:02.576 [INFO][4943] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123" May 14 00:33:02.578688 env[1215]: time="2025-05-14T00:33:02.578219383Z" level=info msg="TearDown network for sandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\" successfully" May 14 00:33:02.583738 env[1215]: time="2025-05-14T00:33:02.583687367Z" level=info msg="RemovePodSandbox \"34a316b4a87dce578da7676a76fe2250b47842401e72e9b02c8834a971d32123\" returns successfully" May 14 00:33:02.584251 env[1215]: time="2025-05-14T00:33:02.584222206Z" level=info msg="StopPodSandbox for \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\"" May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.631 [WARNING][4973] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--95cpg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3e285113-a129-4a13-ae7d-6cc2fd3ed9b8", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e", Pod:"csi-node-driver-95cpg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calife93a79d3be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.631 [INFO][4973] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.632 [INFO][4973] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" iface="eth0" netns="" May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.632 [INFO][4973] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.632 [INFO][4973] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.658 [INFO][4982] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" HandleID="k8s-pod-network.d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.659 [INFO][4982] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.659 [INFO][4982] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.670 [WARNING][4982] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" HandleID="k8s-pod-network.d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.670 [INFO][4982] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" HandleID="k8s-pod-network.d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.674 [INFO][4982] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:02.682066 env[1215]: 2025-05-14 00:33:02.677 [INFO][4973] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:33:02.682066 env[1215]: time="2025-05-14T00:33:02.681530570Z" level=info msg="TearDown network for sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\" successfully" May 14 00:33:02.682066 env[1215]: time="2025-05-14T00:33:02.681559010Z" level=info msg="StopPodSandbox for \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\" returns successfully" May 14 00:33:02.683204 env[1215]: time="2025-05-14T00:33:02.683174645Z" level=info msg="RemovePodSandbox for \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\"" May 14 00:33:02.683290 env[1215]: time="2025-05-14T00:33:02.683209045Z" level=info msg="Forcibly stopping sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\"" May 14 00:33:02.706000 audit[5012]: NETFILTER_CFG table=filter:115 family=2 entries=22 op=nft_register_rule pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:33:02.706000 audit[5012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=fffff5a67ec0 a2=0 a3=1 items=0 ppid=2221 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:02.706000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:33:02.713000 audit[5012]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:33:02.713000 audit[5012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff5a67ec0 a2=0 a3=1 items=0 ppid=2221 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:02.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:33:02.715751 sshd[4658]: pam_unix(sshd:session): session closed for user core May 14 00:33:02.716000 audit[4658]: USER_END pid=4658 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:02.716000 audit[4658]: CRED_DISP pid=4658 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:02.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.19:22-10.0.0.1:39048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:02.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.19:22-10.0.0.1:58864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:02.719705 systemd[1]: Started sshd@18-10.0.0.19:22-10.0.0.1:39048.service. May 14 00:33:02.720233 systemd[1]: sshd@17-10.0.0.19:22-10.0.0.1:58864.service: Deactivated successfully. May 14 00:33:02.720980 systemd[1]: session-18.scope: Deactivated successfully. May 14 00:33:02.722587 systemd-logind[1202]: Session 18 logged out. Waiting for processes to exit. May 14 00:33:02.724240 systemd-logind[1202]: Removed session 18. May 14 00:33:02.732000 audit[5020]: NETFILTER_CFG table=filter:117 family=2 entries=34 op=nft_register_rule pid=5020 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:33:02.732000 audit[5020]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffef6ebc10 a2=0 a3=1 items=0 ppid=2221 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:02.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:33:02.738000 audit[5020]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5020 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:33:02.738000 audit[5020]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffef6ebc10 a2=0 a3=1 items=0 ppid=2221 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:02.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:33:02.763000 audit[5016]: USER_ACCT pid=5016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:02.764231 sshd[5016]: Accepted publickey for core from 10.0.0.1 port 39048 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:33:02.764000 audit[5016]: CRED_ACQ pid=5016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:02.764000 audit[5016]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf9327a0 a2=3 a3=1 items=0 ppid=1 pid=5016 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:02.764000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:33:02.765226 sshd[5016]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:33:02.769888 systemd-logind[1202]: New session 19 of user core. May 14 00:33:02.770371 systemd[1]: Started session-19.scope. May 14 00:33:02.777000 audit[5016]: USER_START pid=5016 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:02.778000 audit[5029]: CRED_ACQ pid=5029 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.751 [WARNING][5006] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--95cpg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3e285113-a129-4a13-ae7d-6cc2fd3ed9b8", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da41e4a47600c40c22ba478b3db1caade23a6e1cdfcbff7eba302b2f8e03358e", Pod:"csi-node-driver-95cpg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calife93a79d3be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.752 [INFO][5006] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.752 [INFO][5006] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" iface="eth0" netns="" May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.752 [INFO][5006] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.752 [INFO][5006] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.784 [INFO][5023] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" HandleID="k8s-pod-network.d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.785 [INFO][5023] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.785 [INFO][5023] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.793 [WARNING][5023] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" HandleID="k8s-pod-network.d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.793 [INFO][5023] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" HandleID="k8s-pod-network.d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" Workload="localhost-k8s-csi--node--driver--95cpg-eth0" May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.794 [INFO][5023] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:02.797899 env[1215]: 2025-05-14 00:33:02.796 [INFO][5006] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b" May 14 00:33:02.797899 env[1215]: time="2025-05-14T00:33:02.797847680Z" level=info msg="TearDown network for sandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\" successfully" May 14 00:33:02.800608 env[1215]: time="2025-05-14T00:33:02.800574513Z" level=info msg="RemovePodSandbox \"d2019e6a1a889ed226b62342d353e61038203c7391a22f7f24097fc02e01071b\" returns successfully" May 14 00:33:02.801081 env[1215]: time="2025-05-14T00:33:02.801050031Z" level=info msg="StopPodSandbox for \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\"" May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.835 [WARNING][5045] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0", GenerateName:"calico-apiserver-6bc974fd89-", Namespace:"calico-apiserver", SelfLink:"", UID:"2b74660c-a4b9-4ffb-8f62-59d1d5a78728", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bc974fd89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be", Pod:"calico-apiserver-6bc974fd89-n5sft", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b2098cb76c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.835 [INFO][5045] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.835 [INFO][5045] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" iface="eth0" netns="" May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.835 [INFO][5045] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.835 [INFO][5045] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.854 [INFO][5059] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" HandleID="k8s-pod-network.87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.854 [INFO][5059] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.855 [INFO][5059] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.863 [WARNING][5059] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" HandleID="k8s-pod-network.87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.864 [INFO][5059] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" HandleID="k8s-pod-network.87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.866 [INFO][5059] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:02.870377 env[1215]: 2025-05-14 00:33:02.869 [INFO][5045] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:33:02.871018 env[1215]: time="2025-05-14T00:33:02.870411435Z" level=info msg="TearDown network for sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\" successfully" May 14 00:33:02.871018 env[1215]: time="2025-05-14T00:33:02.870441555Z" level=info msg="StopPodSandbox for \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\" returns successfully" May 14 00:33:02.871018 env[1215]: time="2025-05-14T00:33:02.870871273Z" level=info msg="RemovePodSandbox for \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\"" May 14 00:33:02.871018 env[1215]: time="2025-05-14T00:33:02.870900873Z" level=info msg="Forcibly stopping sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\"" May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.907 [WARNING][5081] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0", GenerateName:"calico-apiserver-6bc974fd89-", Namespace:"calico-apiserver", SelfLink:"", UID:"2b74660c-a4b9-4ffb-8f62-59d1d5a78728", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 32, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bc974fd89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"78444a6eec1840a429357dbbfed32731fcfb156edb6b8c3e589dbf166689f4be", Pod:"calico-apiserver-6bc974fd89-n5sft", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b2098cb76c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.907 [INFO][5081] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.907 [INFO][5081] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" iface="eth0" netns="" May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.907 [INFO][5081] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.907 [INFO][5081] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.926 [INFO][5091] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" HandleID="k8s-pod-network.87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.927 [INFO][5091] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.927 [INFO][5091] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.935 [WARNING][5091] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" HandleID="k8s-pod-network.87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.935 [INFO][5091] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" HandleID="k8s-pod-network.87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" Workload="localhost-k8s-calico--apiserver--6bc974fd89--n5sft-eth0" May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.937 [INFO][5091] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:33:02.941608 env[1215]: 2025-05-14 00:33:02.939 [INFO][5081] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b" May 14 00:33:02.941608 env[1215]: time="2025-05-14T00:33:02.941240314Z" level=info msg="TearDown network for sandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\" successfully" May 14 00:33:02.946005 env[1215]: time="2025-05-14T00:33:02.945900461Z" level=info msg="RemovePodSandbox \"87e901608bcb768657cfbf59222b894d2bf06b0b398d5c71c00ef120b440013b\" returns successfully" May 14 00:33:03.037078 sshd[5016]: pam_unix(sshd:session): session closed for user core May 14 00:33:03.037797 systemd[1]: Started sshd@19-10.0.0.19:22-10.0.0.1:39052.service. May 14 00:33:03.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.19:22-10.0.0.1:39052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:03.037000 audit[5016]: USER_END pid=5016 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:03.037000 audit[5016]: CRED_DISP pid=5016 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:03.040572 systemd[1]: sshd@18-10.0.0.19:22-10.0.0.1:39048.service: Deactivated successfully. May 14 00:33:03.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.19:22-10.0.0.1:39048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:03.041291 systemd[1]: session-19.scope: Deactivated successfully. May 14 00:33:03.046361 systemd-logind[1202]: Session 19 logged out. Waiting for processes to exit. May 14 00:33:03.047629 systemd-logind[1202]: Removed session 19. May 14 00:33:03.079000 audit[5100]: USER_ACCT pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:03.080426 sshd[5100]: Accepted publickey for core from 10.0.0.1 port 39052 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:33:03.080000 audit[5100]: CRED_ACQ pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:03.080000 audit[5100]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcefe2180 a2=3 a3=1 items=0 ppid=1 pid=5100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:03.080000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:33:03.081557 sshd[5100]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:33:03.086576 systemd-logind[1202]: New session 20 of user core. May 14 00:33:03.086632 systemd[1]: Started session-20.scope. May 14 00:33:03.089000 audit[5100]: USER_START pid=5100 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:03.091000 audit[5103]: CRED_ACQ pid=5103 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:03.212322 sshd[5100]: pam_unix(sshd:session): session closed for user core May 14 00:33:03.212000 audit[5100]: USER_END pid=5100 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:03.213000 audit[5100]: CRED_DISP pid=5100 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:03.215183 systemd[1]: sshd@19-10.0.0.19:22-10.0.0.1:39052.service: Deactivated successfully. May 14 00:33:03.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.19:22-10.0.0.1:39052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:03.215945 systemd[1]: session-20.scope: Deactivated successfully. May 14 00:33:03.216435 systemd-logind[1202]: Session 20 logged out. Waiting for processes to exit. May 14 00:33:03.217126 systemd-logind[1202]: Removed session 20. May 14 00:33:08.217585 systemd[1]: Started sshd@20-10.0.0.19:22-10.0.0.1:39054.service. May 14 00:33:08.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.19:22-10.0.0.1:39054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:08.221312 kernel: kauditd_printk_skb: 63 callbacks suppressed May 14 00:33:08.221430 kernel: audit: type=1130 audit(1747182788.216:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.19:22-10.0.0.1:39054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:08.261000 audit[5133]: USER_ACCT pid=5133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.261996 sshd[5133]: Accepted publickey for core from 10.0.0.1 port 39054 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:33:08.265809 kernel: audit: type=1101 audit(1747182788.261:1475): pid=5133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.265000 audit[5133]: CRED_ACQ pid=5133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.266946 sshd[5133]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:33:08.271698 kernel: audit: type=1103 audit(1747182788.265:1476): pid=5133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.271737 kernel: audit: type=1006 audit(1747182788.265:1477): pid=5133 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 14 00:33:08.265000 audit[5133]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff91cb710 a2=3 a3=1 items=0 ppid=1 pid=5133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:08.275440 kernel: audit: type=1300 audit(1747182788.265:1477): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff91cb710 a2=3 a3=1 items=0 ppid=1 pid=5133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:08.275508 kernel: audit: type=1327 audit(1747182788.265:1477): proctitle=737368643A20636F7265205B707269765D May 14 00:33:08.265000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:33:08.275151 systemd-logind[1202]: New session 21 of user core. May 14 00:33:08.275630 systemd[1]: Started session-21.scope. May 14 00:33:08.279000 audit[5133]: USER_START pid=5133 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.283000 audit[5135]: CRED_ACQ pid=5135 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.286878 kernel: audit: type=1105 audit(1747182788.279:1478): pid=5133 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.286926 kernel: audit: type=1103 audit(1747182788.283:1479): pid=5135 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.421851 sshd[5133]: pam_unix(sshd:session): session closed for user core May 14 00:33:08.422000 audit[5133]: USER_END pid=5133 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.424661 systemd-logind[1202]: Session 21 logged out. Waiting for processes to exit. May 14 00:33:08.424950 systemd[1]: sshd@20-10.0.0.19:22-10.0.0.1:39054.service: Deactivated successfully. May 14 00:33:08.425794 systemd[1]: session-21.scope: Deactivated successfully. May 14 00:33:08.426361 systemd-logind[1202]: Removed session 21. May 14 00:33:08.422000 audit[5133]: CRED_DISP pid=5133 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.430635 kernel: audit: type=1106 audit(1747182788.422:1480): pid=5133 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.430684 kernel: audit: type=1104 audit(1747182788.422:1481): pid=5133 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:08.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.19:22-10.0.0.1:39054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:08.484758 kubelet[2059]: I0514 00:33:08.484668 2059 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:33:08.566000 audit[5146]: NETFILTER_CFG table=filter:119 family=2 entries=21 op=nft_register_rule pid=5146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:33:08.566000 audit[5146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff60f7760 a2=0 a3=1 items=0 ppid=2221 pid=5146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:08.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:33:08.571000 audit[5146]: NETFILTER_CFG table=nat:120 family=2 entries=111 op=nft_register_chain pid=5146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:33:08.571000 audit[5146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=52260 a0=3 a1=fffff60f7760 a2=0 a3=1 items=0 ppid=2221 pid=5146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:08.571000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:33:08.603000 audit[5149]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=5149 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:33:08.603000 audit[5149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffdba9b10 a2=0 a3=1 items=0 ppid=2221 pid=5149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:08.603000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:33:08.609000 audit[5149]: NETFILTER_CFG table=nat:122 family=2 entries=46 op=nft_register_rule pid=5149 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:33:08.609000 audit[5149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=15756 a0=3 a1=fffffdba9b10 a2=0 a3=1 items=0 ppid=2221 pid=5149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:08.609000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:33:13.426946 systemd[1]: Started sshd@21-10.0.0.19:22-10.0.0.1:54370.service. May 14 00:33:13.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.19:22-10.0.0.1:54370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:13.428369 kernel: kauditd_printk_skb: 13 callbacks suppressed May 14 00:33:13.428429 kernel: audit: type=1130 audit(1747182793.426:1487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.19:22-10.0.0.1:54370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:13.474000 audit[5154]: USER_ACCT pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.475864 sshd[5154]: Accepted publickey for core from 10.0.0.1 port 54370 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:33:13.477387 sshd[5154]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:33:13.476000 audit[5154]: CRED_ACQ pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.481894 kernel: audit: type=1101 audit(1747182793.474:1488): pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.481948 kernel: audit: type=1103 audit(1747182793.476:1489): pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.483910 kernel: audit: type=1006 audit(1747182793.476:1490): pid=5154 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 14 00:33:13.476000 audit[5154]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5342080 a2=3 a3=1 items=0 ppid=1 pid=5154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:13.487418 kernel: audit: type=1300 audit(1747182793.476:1490): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5342080 a2=3 a3=1 items=0 ppid=1 pid=5154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:13.476000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:33:13.488617 kernel: audit: type=1327 audit(1747182793.476:1490): proctitle=737368643A20636F7265205B707269765D May 14 00:33:13.491373 systemd-logind[1202]: New session 22 of user core. May 14 00:33:13.491881 systemd[1]: Started session-22.scope. May 14 00:33:13.494000 audit[5154]: USER_START pid=5154 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.495000 audit[5156]: CRED_ACQ pid=5156 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.502265 kernel: audit: type=1105 audit(1747182793.494:1491): pid=5154 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.502359 kernel: audit: type=1103 audit(1747182793.495:1492): pid=5156 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.603447 sshd[5154]: pam_unix(sshd:session): session closed for user core May 14 00:33:13.603000 audit[5154]: USER_END pid=5154 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.606396 systemd[1]: sshd@21-10.0.0.19:22-10.0.0.1:54370.service: Deactivated successfully. May 14 00:33:13.607172 systemd[1]: session-22.scope: Deactivated successfully. May 14 00:33:13.603000 audit[5154]: CRED_DISP pid=5154 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.611632 kernel: audit: type=1106 audit(1747182793.603:1493): pid=5154 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.611696 kernel: audit: type=1104 audit(1747182793.603:1494): pid=5154 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:13.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.19:22-10.0.0.1:54370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:13.611966 systemd-logind[1202]: Session 22 logged out. Waiting for processes to exit. May 14 00:33:13.614721 systemd-logind[1202]: Removed session 22. May 14 00:33:16.989000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:33:16.989000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:33:16.989000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001000ba0 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:33:16.989000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:33:16.989000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001dbaba0 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:33:16.989000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:33:16.989000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:33:16.989000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400212ee60 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:33:16.989000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:33:16.989000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:33:16.989000 audit[1943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001dbabc0 a2=fc6 a3=0 items=0 ppid=1776 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c1021 key=(null) May 14 00:33:16.989000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:33:18.607822 systemd[1]: Started sshd@22-10.0.0.19:22-10.0.0.1:54382.service. May 14 00:33:18.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.19:22-10.0.0.1:54382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:18.609003 kernel: kauditd_printk_skb: 13 callbacks suppressed May 14 00:33:18.609047 kernel: audit: type=1130 audit(1747182798.607:1500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.19:22-10.0.0.1:54382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:18.650074 sshd[5168]: Accepted publickey for core from 10.0.0.1 port 54382 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:33:18.649000 audit[5168]: USER_ACCT pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.653000 audit[5168]: CRED_ACQ pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.654940 sshd[5168]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:33:18.657361 kernel: audit: type=1101 audit(1747182798.649:1501): pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.657425 kernel: audit: type=1103 audit(1747182798.653:1502): pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.659504 kernel: audit: type=1006 audit(1747182798.653:1503): pid=5168 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 14 00:33:18.653000 audit[5168]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcddf7540 a2=3 a3=1 items=0 ppid=1 pid=5168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:18.663486 kernel: audit: type=1300 audit(1747182798.653:1503): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcddf7540 a2=3 a3=1 items=0 ppid=1 pid=5168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:18.653000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:33:18.665524 kernel: audit: type=1327 audit(1747182798.653:1503): proctitle=737368643A20636F7265205B707269765D May 14 00:33:18.667524 systemd-logind[1202]: New session 23 of user core. May 14 00:33:18.668029 systemd[1]: Started session-23.scope. May 14 00:33:18.671000 audit[5168]: USER_START pid=5168 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.672000 audit[5170]: CRED_ACQ pid=5170 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.678316 kernel: audit: type=1105 audit(1747182798.671:1504): pid=5168 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.678376 kernel: audit: type=1103 audit(1747182798.672:1505): pid=5170 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.789296 sshd[5168]: pam_unix(sshd:session): session closed for user core May 14 00:33:18.789000 audit[5168]: USER_END pid=5168 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.792339 systemd[1]: sshd@22-10.0.0.19:22-10.0.0.1:54382.service: Deactivated successfully. May 14 00:33:18.793178 systemd[1]: session-23.scope: Deactivated successfully. May 14 00:33:18.789000 audit[5168]: CRED_DISP pid=5168 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.797831 kernel: audit: type=1106 audit(1747182798.789:1506): pid=5168 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.797896 kernel: audit: type=1104 audit(1747182798.789:1507): pid=5168 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:18.797982 systemd-logind[1202]: Session 23 logged out. Waiting for processes to exit. May 14 00:33:18.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.19:22-10.0.0.1:54382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:18.798762 systemd-logind[1202]: Removed session 23. May 14 00:33:20.047315 kubelet[2059]: I0514 00:33:20.047278 2059 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:33:20.078000 audit[5183]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=5183 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:33:20.078000 audit[5183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc6199e60 a2=0 a3=1 items=0 ppid=2221 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:20.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:33:20.087000 audit[5183]: NETFILTER_CFG table=nat:124 family=2 entries=58 op=nft_register_chain pid=5183 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:33:20.087000 audit[5183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=ffffc6199e60 a2=0 a3=1 items=0 ppid=2221 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:20.087000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:33:21.886679 kubelet[2059]: E0514 00:33:21.886632 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:33:23.794066 systemd[1]: Started sshd@23-10.0.0.19:22-10.0.0.1:36660.service. May 14 00:33:23.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.19:22-10.0.0.1:36660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:23.794965 kernel: kauditd_printk_skb: 7 callbacks suppressed May 14 00:33:23.795040 kernel: audit: type=1130 audit(1747182803.793:1511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.19:22-10.0.0.1:36660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:23.838000 audit[5191]: USER_ACCT pid=5191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.839421 sshd[5191]: Accepted publickey for core from 10.0.0.1 port 36660 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:33:23.840955 sshd[5191]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:33:23.839000 audit[5191]: CRED_ACQ pid=5191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.845364 kernel: audit: type=1101 audit(1747182803.838:1512): pid=5191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.845417 kernel: audit: type=1103 audit(1747182803.839:1513): pid=5191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.839000 audit[5191]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd20768e0 a2=3 a3=1 items=0 ppid=1 pid=5191 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:23.850097 systemd-logind[1202]: New session 24 of user core. May 14 00:33:23.850909 systemd[1]: Started session-24.scope. May 14 00:33:23.851101 kernel: audit: type=1006 audit(1747182803.839:1514): pid=5191 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 14 00:33:23.851149 kernel: audit: type=1300 audit(1747182803.839:1514): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd20768e0 a2=3 a3=1 items=0 ppid=1 pid=5191 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:33:23.839000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:33:23.852310 kernel: audit: type=1327 audit(1747182803.839:1514): proctitle=737368643A20636F7265205B707269765D May 14 00:33:23.854000 audit[5191]: USER_START pid=5191 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.856000 audit[5193]: CRED_ACQ pid=5193 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.862307 kernel: audit: type=1105 audit(1747182803.854:1515): pid=5191 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.862380 kernel: audit: type=1103 audit(1747182803.856:1516): pid=5193 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.978958 sshd[5191]: pam_unix(sshd:session): session closed for user core May 14 00:33:23.979000 audit[5191]: USER_END pid=5191 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.982184 systemd[1]: sshd@23-10.0.0.19:22-10.0.0.1:36660.service: Deactivated successfully. May 14 00:33:23.982935 systemd[1]: session-24.scope: Deactivated successfully. May 14 00:33:23.983708 systemd-logind[1202]: Session 24 logged out. Waiting for processes to exit. May 14 00:33:23.979000 audit[5191]: CRED_DISP pid=5191 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.984569 systemd-logind[1202]: Removed session 24. May 14 00:33:23.987313 kernel: audit: type=1106 audit(1747182803.979:1517): pid=5191 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.987397 kernel: audit: type=1104 audit(1747182803.979:1518): pid=5191 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:33:23.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.19:22-10.0.0.1:36660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:33:24.886767 kubelet[2059]: E0514 00:33:24.886728 2059 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"