May 14 00:46:51.756262 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 14 00:46:51.756283 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Tue May 13 23:17:31 -00 2025 May 14 00:46:51.756291 kernel: efi: EFI v2.70 by EDK II May 14 00:46:51.756296 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 14 00:46:51.756301 kernel: random: crng init done May 14 00:46:51.756307 kernel: ACPI: Early table checksum verification disabled May 14 00:46:51.756313 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 14 00:46:51.756320 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 14 00:46:51.756326 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:46:51.756331 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:46:51.756337 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:46:51.756342 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:46:51.756348 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:46:51.756353 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:46:51.756361 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:46:51.756367 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:46:51.756373 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:46:51.756379 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 14 00:46:51.756384 kernel: NUMA: Failed to initialise from firmware May 14 00:46:51.756402 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:46:51.756409 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 14 00:46:51.756415 kernel: Zone ranges: May 14 00:46:51.756420 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:46:51.756427 kernel: DMA32 empty May 14 00:46:51.756433 kernel: Normal empty May 14 00:46:51.756439 kernel: Movable zone start for each node May 14 00:46:51.756445 kernel: Early memory node ranges May 14 00:46:51.756450 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 14 00:46:51.756456 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 14 00:46:51.756462 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 14 00:46:51.756467 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 14 00:46:51.756473 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 14 00:46:51.756478 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 14 00:46:51.756484 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 14 00:46:51.756490 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:46:51.756497 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 14 00:46:51.756502 kernel: psci: probing for conduit method from ACPI. May 14 00:46:51.756508 kernel: psci: PSCIv1.1 detected in firmware. May 14 00:46:51.756513 kernel: psci: Using standard PSCI v0.2 function IDs May 14 00:46:51.756519 kernel: psci: Trusted OS migration not required May 14 00:46:51.756528 kernel: psci: SMC Calling Convention v1.1 May 14 00:46:51.756534 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 14 00:46:51.756541 kernel: ACPI: SRAT not present May 14 00:46:51.756547 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 14 00:46:51.756553 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 14 00:46:51.756560 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 14 00:46:51.756566 kernel: Detected PIPT I-cache on CPU0 May 14 00:46:51.756572 kernel: CPU features: detected: GIC system register CPU interface May 14 00:46:51.756578 kernel: CPU features: detected: Hardware dirty bit management May 14 00:46:51.756584 kernel: CPU features: detected: Spectre-v4 May 14 00:46:51.756590 kernel: CPU features: detected: Spectre-BHB May 14 00:46:51.756597 kernel: CPU features: kernel page table isolation forced ON by KASLR May 14 00:46:51.756603 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 14 00:46:51.756609 kernel: CPU features: detected: ARM erratum 1418040 May 14 00:46:51.756615 kernel: CPU features: detected: SSBS not fully self-synchronizing May 14 00:46:51.756621 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 14 00:46:51.756626 kernel: Policy zone: DMA May 14 00:46:51.756633 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=412b3b42de04d7d5abb18ecf506be3ad2c72d6425f1b2391aa97d359e8bd9923 May 14 00:46:51.756640 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 14 00:46:51.756646 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 14 00:46:51.756652 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 14 00:46:51.756658 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 14 00:46:51.756666 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36480K init, 777K bss, 114948K reserved, 0K cma-reserved) May 14 00:46:51.756672 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 14 00:46:51.756678 kernel: trace event string verifier disabled May 14 00:46:51.756684 kernel: rcu: Preemptible hierarchical RCU implementation. May 14 00:46:51.756691 kernel: rcu: RCU event tracing is enabled. May 14 00:46:51.756697 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 14 00:46:51.756704 kernel: Trampoline variant of Tasks RCU enabled. May 14 00:46:51.756710 kernel: Tracing variant of Tasks RCU enabled. May 14 00:46:51.756716 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 14 00:46:51.756722 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 14 00:46:51.756728 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 14 00:46:51.756735 kernel: GICv3: 256 SPIs implemented May 14 00:46:51.756742 kernel: GICv3: 0 Extended SPIs implemented May 14 00:46:51.756748 kernel: GICv3: Distributor has no Range Selector support May 14 00:46:51.756754 kernel: Root IRQ handler: gic_handle_irq May 14 00:46:51.756760 kernel: GICv3: 16 PPIs implemented May 14 00:46:51.756766 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 14 00:46:51.756772 kernel: ACPI: SRAT not present May 14 00:46:51.756778 kernel: ITS [mem 0x08080000-0x0809ffff] May 14 00:46:51.756785 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 14 00:46:51.756791 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 14 00:46:51.756797 kernel: GICv3: using LPI property table @0x00000000400d0000 May 14 00:46:51.756803 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 14 00:46:51.756811 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:46:51.756817 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 14 00:46:51.756823 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 14 00:46:51.756829 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 14 00:46:51.756835 kernel: arm-pv: using stolen time PV May 14 00:46:51.756841 kernel: Console: colour dummy device 80x25 May 14 00:46:51.756847 kernel: ACPI: Core revision 20210730 May 14 00:46:51.756854 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 14 00:46:51.756860 kernel: pid_max: default: 32768 minimum: 301 May 14 00:46:51.756866 kernel: LSM: Security Framework initializing May 14 00:46:51.756873 kernel: SELinux: Initializing. May 14 00:46:51.756880 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 14 00:46:51.756886 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 14 00:46:51.756892 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 14 00:46:51.756898 kernel: rcu: Hierarchical SRCU implementation. May 14 00:46:51.756904 kernel: Platform MSI: ITS@0x8080000 domain created May 14 00:46:51.756911 kernel: PCI/MSI: ITS@0x8080000 domain created May 14 00:46:51.756917 kernel: Remapping and enabling EFI services. May 14 00:46:51.756923 kernel: smp: Bringing up secondary CPUs ... May 14 00:46:51.756930 kernel: Detected PIPT I-cache on CPU1 May 14 00:46:51.756937 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 14 00:46:51.756943 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 14 00:46:51.756949 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:46:51.756956 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 14 00:46:51.756962 kernel: Detected PIPT I-cache on CPU2 May 14 00:46:51.756968 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 14 00:46:51.756975 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 14 00:46:51.756981 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:46:51.756987 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 14 00:46:51.756994 kernel: Detected PIPT I-cache on CPU3 May 14 00:46:51.757001 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 14 00:46:51.757007 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 14 00:46:51.757013 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:46:51.757024 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 14 00:46:51.757031 kernel: smp: Brought up 1 node, 4 CPUs May 14 00:46:51.757038 kernel: SMP: Total of 4 processors activated. May 14 00:46:51.757044 kernel: CPU features: detected: 32-bit EL0 Support May 14 00:46:51.757051 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 14 00:46:51.757057 kernel: CPU features: detected: Common not Private translations May 14 00:46:51.757063 kernel: CPU features: detected: CRC32 instructions May 14 00:46:51.757070 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 14 00:46:51.757078 kernel: CPU features: detected: LSE atomic instructions May 14 00:46:51.757084 kernel: CPU features: detected: Privileged Access Never May 14 00:46:51.757091 kernel: CPU features: detected: RAS Extension Support May 14 00:46:51.757098 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 14 00:46:51.757104 kernel: CPU: All CPU(s) started at EL1 May 14 00:46:51.757112 kernel: alternatives: patching kernel code May 14 00:46:51.757118 kernel: devtmpfs: initialized May 14 00:46:51.757131 kernel: KASLR enabled May 14 00:46:51.757138 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 14 00:46:51.757144 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 14 00:46:51.757151 kernel: pinctrl core: initialized pinctrl subsystem May 14 00:46:51.757157 kernel: SMBIOS 3.0.0 present. May 14 00:46:51.757164 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 14 00:46:51.757170 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 14 00:46:51.757205 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 14 00:46:51.757213 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 14 00:46:51.757220 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 14 00:46:51.757226 kernel: audit: initializing netlink subsys (disabled) May 14 00:46:51.757233 kernel: audit: type=2000 audit(0.042:1): state=initialized audit_enabled=0 res=1 May 14 00:46:51.757240 kernel: thermal_sys: Registered thermal governor 'step_wise' May 14 00:46:51.757246 kernel: cpuidle: using governor menu May 14 00:46:51.757253 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 14 00:46:51.757259 kernel: ASID allocator initialised with 32768 entries May 14 00:46:51.757267 kernel: ACPI: bus type PCI registered May 14 00:46:51.757274 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 14 00:46:51.757281 kernel: Serial: AMBA PL011 UART driver May 14 00:46:51.757287 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 14 00:46:51.757294 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 14 00:46:51.757301 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 14 00:46:51.757307 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 14 00:46:51.757314 kernel: cryptd: max_cpu_qlen set to 1000 May 14 00:46:51.757321 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 14 00:46:51.757328 kernel: ACPI: Added _OSI(Module Device) May 14 00:46:51.757335 kernel: ACPI: Added _OSI(Processor Device) May 14 00:46:51.757341 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 14 00:46:51.757348 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 14 00:46:51.757354 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 14 00:46:51.757361 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 14 00:46:51.757368 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 14 00:46:51.757374 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 14 00:46:51.757381 kernel: ACPI: Interpreter enabled May 14 00:46:51.757388 kernel: ACPI: Using GIC for interrupt routing May 14 00:46:51.757404 kernel: ACPI: MCFG table detected, 1 entries May 14 00:46:51.757411 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 14 00:46:51.757418 kernel: printk: console [ttyAMA0] enabled May 14 00:46:51.757424 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 14 00:46:51.757555 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 14 00:46:51.757619 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 14 00:46:51.757679 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 14 00:46:51.757737 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 14 00:46:51.757793 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 14 00:46:51.757801 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 14 00:46:51.757808 kernel: PCI host bridge to bus 0000:00 May 14 00:46:51.757871 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 14 00:46:51.757925 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 14 00:46:51.757976 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 14 00:46:51.758029 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 14 00:46:51.758102 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 14 00:46:51.758181 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 14 00:46:51.758243 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 14 00:46:51.758302 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 14 00:46:51.758360 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 14 00:46:51.758430 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 14 00:46:51.758490 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 14 00:46:51.758548 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 14 00:46:51.758598 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 14 00:46:51.758649 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 14 00:46:51.758704 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 14 00:46:51.758712 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 14 00:46:51.758719 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 14 00:46:51.758727 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 14 00:46:51.758734 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 14 00:46:51.758741 kernel: iommu: Default domain type: Translated May 14 00:46:51.758747 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 14 00:46:51.758754 kernel: vgaarb: loaded May 14 00:46:51.758760 kernel: pps_core: LinuxPPS API ver. 1 registered May 14 00:46:51.758767 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 14 00:46:51.758773 kernel: PTP clock support registered May 14 00:46:51.758780 kernel: Registered efivars operations May 14 00:46:51.758788 kernel: clocksource: Switched to clocksource arch_sys_counter May 14 00:46:51.758794 kernel: VFS: Disk quotas dquot_6.6.0 May 14 00:46:51.758801 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 14 00:46:51.758808 kernel: pnp: PnP ACPI init May 14 00:46:51.758875 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 14 00:46:51.758885 kernel: pnp: PnP ACPI: found 1 devices May 14 00:46:51.758892 kernel: NET: Registered PF_INET protocol family May 14 00:46:51.758898 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 14 00:46:51.758907 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 14 00:46:51.758914 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 14 00:46:51.758920 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 14 00:46:51.758927 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 14 00:46:51.758934 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 14 00:46:51.758940 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 14 00:46:51.758947 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 14 00:46:51.758953 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 14 00:46:51.758960 kernel: PCI: CLS 0 bytes, default 64 May 14 00:46:51.758968 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 14 00:46:51.758974 kernel: kvm [1]: HYP mode not available May 14 00:46:51.758981 kernel: Initialise system trusted keyrings May 14 00:46:51.758987 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 14 00:46:51.758994 kernel: Key type asymmetric registered May 14 00:46:51.759000 kernel: Asymmetric key parser 'x509' registered May 14 00:46:51.759007 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 14 00:46:51.759014 kernel: io scheduler mq-deadline registered May 14 00:46:51.759020 kernel: io scheduler kyber registered May 14 00:46:51.759028 kernel: io scheduler bfq registered May 14 00:46:51.759034 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 14 00:46:51.759041 kernel: ACPI: button: Power Button [PWRB] May 14 00:46:51.759048 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 14 00:46:51.759107 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 14 00:46:51.759115 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 14 00:46:51.759129 kernel: thunder_xcv, ver 1.0 May 14 00:46:51.759136 kernel: thunder_bgx, ver 1.0 May 14 00:46:51.759143 kernel: nicpf, ver 1.0 May 14 00:46:51.759151 kernel: nicvf, ver 1.0 May 14 00:46:51.759223 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 14 00:46:51.759278 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-14T00:46:51 UTC (1747183611) May 14 00:46:51.759287 kernel: hid: raw HID events driver (C) Jiri Kosina May 14 00:46:51.759294 kernel: NET: Registered PF_INET6 protocol family May 14 00:46:51.759300 kernel: Segment Routing with IPv6 May 14 00:46:51.759307 kernel: In-situ OAM (IOAM) with IPv6 May 14 00:46:51.759314 kernel: NET: Registered PF_PACKET protocol family May 14 00:46:51.759322 kernel: Key type dns_resolver registered May 14 00:46:51.759328 kernel: registered taskstats version 1 May 14 00:46:51.759335 kernel: Loading compiled-in X.509 certificates May 14 00:46:51.759342 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 7727f4e7680a5b8534f3d5e7bb84b1f695e8c34b' May 14 00:46:51.759348 kernel: Key type .fscrypt registered May 14 00:46:51.759355 kernel: Key type fscrypt-provisioning registered May 14 00:46:51.759361 kernel: ima: No TPM chip found, activating TPM-bypass! May 14 00:46:51.759368 kernel: ima: Allocated hash algorithm: sha1 May 14 00:46:51.759374 kernel: ima: No architecture policies found May 14 00:46:51.759382 kernel: clk: Disabling unused clocks May 14 00:46:51.759389 kernel: Freeing unused kernel memory: 36480K May 14 00:46:51.759403 kernel: Run /init as init process May 14 00:46:51.759410 kernel: with arguments: May 14 00:46:51.759416 kernel: /init May 14 00:46:51.759422 kernel: with environment: May 14 00:46:51.759429 kernel: HOME=/ May 14 00:46:51.759435 kernel: TERM=linux May 14 00:46:51.759441 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 14 00:46:51.759452 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 14 00:46:51.759461 systemd[1]: Detected virtualization kvm. May 14 00:46:51.759468 systemd[1]: Detected architecture arm64. May 14 00:46:51.759475 systemd[1]: Running in initrd. May 14 00:46:51.759482 systemd[1]: No hostname configured, using default hostname. May 14 00:46:51.759488 systemd[1]: Hostname set to . May 14 00:46:51.759496 systemd[1]: Initializing machine ID from VM UUID. May 14 00:46:51.759504 systemd[1]: Queued start job for default target initrd.target. May 14 00:46:51.759511 systemd[1]: Started systemd-ask-password-console.path. May 14 00:46:51.759518 systemd[1]: Reached target cryptsetup.target. May 14 00:46:51.759525 systemd[1]: Reached target paths.target. May 14 00:46:51.759532 systemd[1]: Reached target slices.target. May 14 00:46:51.759538 systemd[1]: Reached target swap.target. May 14 00:46:51.759545 systemd[1]: Reached target timers.target. May 14 00:46:51.759552 systemd[1]: Listening on iscsid.socket. May 14 00:46:51.759561 systemd[1]: Listening on iscsiuio.socket. May 14 00:46:51.759568 systemd[1]: Listening on systemd-journald-audit.socket. May 14 00:46:51.759575 systemd[1]: Listening on systemd-journald-dev-log.socket. May 14 00:46:51.759582 systemd[1]: Listening on systemd-journald.socket. May 14 00:46:51.759589 systemd[1]: Listening on systemd-networkd.socket. May 14 00:46:51.759596 systemd[1]: Listening on systemd-udevd-control.socket. May 14 00:46:51.759622 systemd[1]: Listening on systemd-udevd-kernel.socket. May 14 00:46:51.759631 systemd[1]: Reached target sockets.target. May 14 00:46:51.759640 systemd[1]: Starting kmod-static-nodes.service... May 14 00:46:51.759674 systemd[1]: Finished network-cleanup.service. May 14 00:46:51.759682 systemd[1]: Starting systemd-fsck-usr.service... May 14 00:46:51.759689 systemd[1]: Starting systemd-journald.service... May 14 00:46:51.759696 systemd[1]: Starting systemd-modules-load.service... May 14 00:46:51.759703 systemd[1]: Starting systemd-resolved.service... May 14 00:46:51.759710 systemd[1]: Starting systemd-vconsole-setup.service... May 14 00:46:51.759717 systemd[1]: Finished kmod-static-nodes.service. May 14 00:46:51.759723 systemd[1]: Finished systemd-fsck-usr.service. May 14 00:46:51.759732 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 14 00:46:51.759739 systemd[1]: Finished systemd-vconsole-setup.service. May 14 00:46:51.759747 kernel: audit: type=1130 audit(1747183611.756:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.759758 systemd-journald[290]: Journal started May 14 00:46:51.759803 systemd-journald[290]: Runtime Journal (/run/log/journal/17049698923246c7b388fb85aa5f1e61) is 6.0M, max 48.7M, 42.6M free. May 14 00:46:51.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.750130 systemd-modules-load[291]: Inserted module 'overlay' May 14 00:46:51.764607 systemd[1]: Started systemd-journald.service. May 14 00:46:51.764627 kernel: audit: type=1130 audit(1747183611.761:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.764734 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 14 00:46:51.768781 kernel: audit: type=1130 audit(1747183611.765:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.769561 systemd[1]: Starting dracut-cmdline-ask.service... May 14 00:46:51.775581 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 14 00:46:51.779412 kernel: Bridge firewalling registered May 14 00:46:51.779461 systemd-modules-load[291]: Inserted module 'br_netfilter' May 14 00:46:51.780882 systemd-resolved[292]: Positive Trust Anchors: May 14 00:46:51.780895 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 14 00:46:51.780924 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 14 00:46:51.785138 systemd-resolved[292]: Defaulting to hostname 'linux'. May 14 00:46:51.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.785897 systemd[1]: Started systemd-resolved.service. May 14 00:46:51.793647 kernel: audit: type=1130 audit(1747183611.788:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.793665 kernel: SCSI subsystem initialized May 14 00:46:51.791804 systemd[1]: Reached target nss-lookup.target. May 14 00:46:51.797748 systemd[1]: Finished dracut-cmdline-ask.service. May 14 00:46:51.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.801730 systemd[1]: Starting dracut-cmdline.service... May 14 00:46:51.805825 kernel: audit: type=1130 audit(1747183611.798:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.805844 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 14 00:46:51.805854 kernel: device-mapper: uevent: version 1.0.3 May 14 00:46:51.805862 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 14 00:46:51.808417 systemd-modules-load[291]: Inserted module 'dm_multipath' May 14 00:46:51.809103 systemd[1]: Finished systemd-modules-load.service. May 14 00:46:51.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.813231 dracut-cmdline[309]: dracut-dracut-053 May 14 00:46:51.815008 kernel: audit: type=1130 audit(1747183611.809:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.813167 systemd[1]: Starting systemd-sysctl.service... May 14 00:46:51.815883 dracut-cmdline[309]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=412b3b42de04d7d5abb18ecf506be3ad2c72d6425f1b2391aa97d359e8bd9923 May 14 00:46:51.821524 systemd[1]: Finished systemd-sysctl.service. May 14 00:46:51.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.826403 kernel: audit: type=1130 audit(1747183611.821:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.881429 kernel: Loading iSCSI transport class v2.0-870. May 14 00:46:51.895424 kernel: iscsi: registered transport (tcp) May 14 00:46:51.912422 kernel: iscsi: registered transport (qla4xxx) May 14 00:46:51.912458 kernel: QLogic iSCSI HBA Driver May 14 00:46:51.946702 systemd[1]: Finished dracut-cmdline.service. May 14 00:46:51.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.948308 systemd[1]: Starting dracut-pre-udev.service... May 14 00:46:51.951762 kernel: audit: type=1130 audit(1747183611.947:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:51.991433 kernel: raid6: neonx8 gen() 13747 MB/s May 14 00:46:52.008420 kernel: raid6: neonx8 xor() 10718 MB/s May 14 00:46:52.025417 kernel: raid6: neonx4 gen() 13437 MB/s May 14 00:46:52.042417 kernel: raid6: neonx4 xor() 11168 MB/s May 14 00:46:52.059410 kernel: raid6: neonx2 gen() 12834 MB/s May 14 00:46:52.076412 kernel: raid6: neonx2 xor() 10381 MB/s May 14 00:46:52.093410 kernel: raid6: neonx1 gen() 10533 MB/s May 14 00:46:52.110409 kernel: raid6: neonx1 xor() 8742 MB/s May 14 00:46:52.127429 kernel: raid6: int64x8 gen() 6206 MB/s May 14 00:46:52.144415 kernel: raid6: int64x8 xor() 3522 MB/s May 14 00:46:52.161414 kernel: raid6: int64x4 gen() 7204 MB/s May 14 00:46:52.178413 kernel: raid6: int64x4 xor() 3833 MB/s May 14 00:46:52.195414 kernel: raid6: int64x2 gen() 6137 MB/s May 14 00:46:52.212415 kernel: raid6: int64x2 xor() 3314 MB/s May 14 00:46:52.229414 kernel: raid6: int64x1 gen() 5030 MB/s May 14 00:46:52.246499 kernel: raid6: int64x1 xor() 2636 MB/s May 14 00:46:52.246513 kernel: raid6: using algorithm neonx8 gen() 13747 MB/s May 14 00:46:52.246522 kernel: raid6: .... xor() 10718 MB/s, rmw enabled May 14 00:46:52.247592 kernel: raid6: using neon recovery algorithm May 14 00:46:52.259284 kernel: xor: measuring software checksum speed May 14 00:46:52.260613 kernel: 8regs : 1653 MB/sec May 14 00:46:52.260628 kernel: 32regs : 20717 MB/sec May 14 00:46:52.261844 kernel: arm64_neon : 27542 MB/sec May 14 00:46:52.261864 kernel: xor: using function: arm64_neon (27542 MB/sec) May 14 00:46:52.319418 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 14 00:46:52.331014 systemd[1]: Finished dracut-pre-udev.service. May 14 00:46:52.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:52.334000 audit: BPF prog-id=7 op=LOAD May 14 00:46:52.334000 audit: BPF prog-id=8 op=LOAD May 14 00:46:52.335351 systemd[1]: Starting systemd-udevd.service... May 14 00:46:52.336767 kernel: audit: type=1130 audit(1747183612.331:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:52.347825 systemd-udevd[491]: Using default interface naming scheme 'v252'. May 14 00:46:52.351143 systemd[1]: Started systemd-udevd.service. May 14 00:46:52.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:52.355564 systemd[1]: Starting dracut-pre-trigger.service... May 14 00:46:52.365915 dracut-pre-trigger[506]: rd.md=0: removing MD RAID activation May 14 00:46:52.393622 systemd[1]: Finished dracut-pre-trigger.service. May 14 00:46:52.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:52.395216 systemd[1]: Starting systemd-udev-trigger.service... May 14 00:46:52.429230 systemd[1]: Finished systemd-udev-trigger.service. May 14 00:46:52.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:52.456250 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 14 00:46:52.461169 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 14 00:46:52.461185 kernel: GPT:9289727 != 19775487 May 14 00:46:52.461194 kernel: GPT:Alternate GPT header not at the end of the disk. May 14 00:46:52.461209 kernel: GPT:9289727 != 19775487 May 14 00:46:52.461217 kernel: GPT: Use GNU Parted to correct GPT errors. May 14 00:46:52.461225 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:46:52.476419 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (548) May 14 00:46:52.476467 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 14 00:46:52.479944 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 14 00:46:52.484634 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 14 00:46:52.485625 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 14 00:46:52.490486 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 14 00:46:52.492146 systemd[1]: Starting disk-uuid.service... May 14 00:46:52.497733 disk-uuid[561]: Primary Header is updated. May 14 00:46:52.497733 disk-uuid[561]: Secondary Entries is updated. May 14 00:46:52.497733 disk-uuid[561]: Secondary Header is updated. May 14 00:46:52.505422 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:46:53.511373 disk-uuid[562]: The operation has completed successfully. May 14 00:46:53.512466 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:46:53.535940 systemd[1]: disk-uuid.service: Deactivated successfully. May 14 00:46:53.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.536043 systemd[1]: Finished disk-uuid.service. May 14 00:46:53.537658 systemd[1]: Starting verity-setup.service... May 14 00:46:53.551411 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 14 00:46:53.572538 systemd[1]: Found device dev-mapper-usr.device. May 14 00:46:53.574822 systemd[1]: Mounting sysusr-usr.mount... May 14 00:46:53.576460 systemd[1]: Finished verity-setup.service. May 14 00:46:53.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.627411 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 14 00:46:53.627727 systemd[1]: Mounted sysusr-usr.mount. May 14 00:46:53.628589 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 14 00:46:53.629250 systemd[1]: Starting ignition-setup.service... May 14 00:46:53.631719 systemd[1]: Starting parse-ip-for-networkd.service... May 14 00:46:53.638741 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 14 00:46:53.638781 kernel: BTRFS info (device vda6): using free space tree May 14 00:46:53.638791 kernel: BTRFS info (device vda6): has skinny extents May 14 00:46:53.647371 systemd[1]: mnt-oem.mount: Deactivated successfully. May 14 00:46:53.653093 systemd[1]: Finished ignition-setup.service. May 14 00:46:53.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.654644 systemd[1]: Starting ignition-fetch-offline.service... May 14 00:46:53.718745 systemd[1]: Finished parse-ip-for-networkd.service. May 14 00:46:53.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.721000 audit: BPF prog-id=9 op=LOAD May 14 00:46:53.722416 systemd[1]: Starting systemd-networkd.service... May 14 00:46:53.731874 ignition[649]: Ignition 2.14.0 May 14 00:46:53.731885 ignition[649]: Stage: fetch-offline May 14 00:46:53.731925 ignition[649]: no configs at "/usr/lib/ignition/base.d" May 14 00:46:53.731937 ignition[649]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:46:53.732089 ignition[649]: parsed url from cmdline: "" May 14 00:46:53.732092 ignition[649]: no config URL provided May 14 00:46:53.732096 ignition[649]: reading system config file "/usr/lib/ignition/user.ign" May 14 00:46:53.732103 ignition[649]: no config at "/usr/lib/ignition/user.ign" May 14 00:46:53.732122 ignition[649]: op(1): [started] loading QEMU firmware config module May 14 00:46:53.732127 ignition[649]: op(1): executing: "modprobe" "qemu_fw_cfg" May 14 00:46:53.739376 ignition[649]: op(1): [finished] loading QEMU firmware config module May 14 00:46:53.751105 systemd-networkd[739]: lo: Link UP May 14 00:46:53.751117 systemd-networkd[739]: lo: Gained carrier May 14 00:46:53.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.751494 systemd-networkd[739]: Enumeration completed May 14 00:46:53.751663 systemd-networkd[739]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 14 00:46:53.751758 systemd[1]: Started systemd-networkd.service. May 14 00:46:53.752630 systemd-networkd[739]: eth0: Link UP May 14 00:46:53.752633 systemd-networkd[739]: eth0: Gained carrier May 14 00:46:53.753488 systemd[1]: Reached target network.target. May 14 00:46:53.755596 systemd[1]: Starting iscsiuio.service... May 14 00:46:53.764429 systemd[1]: Started iscsiuio.service. May 14 00:46:53.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.766338 systemd[1]: Starting iscsid.service... May 14 00:46:53.769445 iscsid[746]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 14 00:46:53.769445 iscsid[746]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 14 00:46:53.769445 iscsid[746]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 14 00:46:53.769445 iscsid[746]: If using hardware iscsi like qla4xxx this message can be ignored. May 14 00:46:53.769445 iscsid[746]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 14 00:46:53.769445 iscsid[746]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 14 00:46:53.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.772440 systemd[1]: Started iscsid.service. May 14 00:46:53.773480 systemd-networkd[739]: eth0: DHCPv4 address 10.0.0.97/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 14 00:46:53.778326 systemd[1]: Starting dracut-initqueue.service... May 14 00:46:53.788012 systemd[1]: Finished dracut-initqueue.service. May 14 00:46:53.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.789015 systemd[1]: Reached target remote-fs-pre.target. May 14 00:46:53.790502 systemd[1]: Reached target remote-cryptsetup.target. May 14 00:46:53.792068 systemd[1]: Reached target remote-fs.target. May 14 00:46:53.794327 systemd[1]: Starting dracut-pre-mount.service... May 14 00:46:53.801669 systemd[1]: Finished dracut-pre-mount.service. May 14 00:46:53.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.805978 ignition[649]: parsing config with SHA512: 02694aac23786bbd5e7f79caf21cd967eb24ebdf5793a72852d4a85a78a2107ad76cfb6a0da24be64feb05fb29da719beac9cfdd62b6674b6558aa1990d67d05 May 14 00:46:53.814559 unknown[649]: fetched base config from "system" May 14 00:46:53.814570 unknown[649]: fetched user config from "qemu" May 14 00:46:53.815060 ignition[649]: fetch-offline: fetch-offline passed May 14 00:46:53.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.816118 systemd[1]: Finished ignition-fetch-offline.service. May 14 00:46:53.815117 ignition[649]: Ignition finished successfully May 14 00:46:53.817665 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 14 00:46:53.818436 systemd[1]: Starting ignition-kargs.service... May 14 00:46:53.826916 ignition[760]: Ignition 2.14.0 May 14 00:46:53.826926 ignition[760]: Stage: kargs May 14 00:46:53.827015 ignition[760]: no configs at "/usr/lib/ignition/base.d" May 14 00:46:53.829074 systemd[1]: Finished ignition-kargs.service. May 14 00:46:53.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.827025 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:46:53.827851 ignition[760]: kargs: kargs passed May 14 00:46:53.831313 systemd[1]: Starting ignition-disks.service... May 14 00:46:53.827891 ignition[760]: Ignition finished successfully May 14 00:46:53.838421 ignition[766]: Ignition 2.14.0 May 14 00:46:53.838433 ignition[766]: Stage: disks May 14 00:46:53.838528 ignition[766]: no configs at "/usr/lib/ignition/base.d" May 14 00:46:53.838537 ignition[766]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:46:53.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.840260 systemd[1]: Finished ignition-disks.service. May 14 00:46:53.839439 ignition[766]: disks: disks passed May 14 00:46:53.841320 systemd[1]: Reached target initrd-root-device.target. May 14 00:46:53.839482 ignition[766]: Ignition finished successfully May 14 00:46:53.842915 systemd[1]: Reached target local-fs-pre.target. May 14 00:46:53.844182 systemd[1]: Reached target local-fs.target. May 14 00:46:53.845409 systemd[1]: Reached target sysinit.target. May 14 00:46:53.846752 systemd[1]: Reached target basic.target. May 14 00:46:53.848802 systemd[1]: Starting systemd-fsck-root.service... May 14 00:46:53.860932 systemd-fsck[774]: ROOT: clean, 619/553520 files, 56022/553472 blocks May 14 00:46:53.865232 systemd[1]: Finished systemd-fsck-root.service. May 14 00:46:53.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.868206 systemd[1]: Mounting sysroot.mount... May 14 00:46:53.875427 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 14 00:46:53.875583 systemd[1]: Mounted sysroot.mount. May 14 00:46:53.876286 systemd[1]: Reached target initrd-root-fs.target. May 14 00:46:53.878933 systemd[1]: Mounting sysroot-usr.mount... May 14 00:46:53.879795 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 14 00:46:53.879843 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 14 00:46:53.879864 systemd[1]: Reached target ignition-diskful.target. May 14 00:46:53.883739 systemd[1]: Mounted sysroot-usr.mount. May 14 00:46:53.885689 systemd[1]: Starting initrd-setup-root.service... May 14 00:46:53.889845 initrd-setup-root[784]: cut: /sysroot/etc/passwd: No such file or directory May 14 00:46:53.893372 initrd-setup-root[792]: cut: /sysroot/etc/group: No such file or directory May 14 00:46:53.897214 initrd-setup-root[800]: cut: /sysroot/etc/shadow: No such file or directory May 14 00:46:53.901020 initrd-setup-root[808]: cut: /sysroot/etc/gshadow: No such file or directory May 14 00:46:53.926289 systemd[1]: Finished initrd-setup-root.service. May 14 00:46:53.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.927855 systemd[1]: Starting ignition-mount.service... May 14 00:46:53.929117 systemd[1]: Starting sysroot-boot.service... May 14 00:46:53.933481 bash[825]: umount: /sysroot/usr/share/oem: not mounted. May 14 00:46:53.941786 ignition[827]: INFO : Ignition 2.14.0 May 14 00:46:53.941786 ignition[827]: INFO : Stage: mount May 14 00:46:53.943242 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:46:53.943242 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:46:53.943242 ignition[827]: INFO : mount: mount passed May 14 00:46:53.943242 ignition[827]: INFO : Ignition finished successfully May 14 00:46:53.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.945818 systemd[1]: Finished ignition-mount.service. May 14 00:46:53.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:53.947014 systemd[1]: Finished sysroot-boot.service. May 14 00:46:54.584242 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 14 00:46:54.591287 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (835) May 14 00:46:54.591319 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 14 00:46:54.591330 kernel: BTRFS info (device vda6): using free space tree May 14 00:46:54.592586 kernel: BTRFS info (device vda6): has skinny extents May 14 00:46:54.595295 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 14 00:46:54.596860 systemd[1]: Starting ignition-files.service... May 14 00:46:54.610953 ignition[855]: INFO : Ignition 2.14.0 May 14 00:46:54.610953 ignition[855]: INFO : Stage: files May 14 00:46:54.612570 ignition[855]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:46:54.612570 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:46:54.612570 ignition[855]: DEBUG : files: compiled without relabeling support, skipping May 14 00:46:54.617794 ignition[855]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 14 00:46:54.617794 ignition[855]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 14 00:46:54.622338 ignition[855]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 14 00:46:54.623737 ignition[855]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 14 00:46:54.623737 ignition[855]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 14 00:46:54.623737 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 14 00:46:54.623737 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-arm64.tar.gz: attempt #1 May 14 00:46:54.623112 unknown[855]: wrote ssh authorized keys file for user: core May 14 00:46:54.696967 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 14 00:46:54.894439 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 14 00:46:54.894439 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 14 00:46:54.898212 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-arm64.raw: attempt #1 May 14 00:46:55.282539 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 14 00:46:55.342611 systemd-networkd[739]: eth0: Gained IPv6LL May 14 00:46:55.988875 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 14 00:46:55.991022 ignition[855]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 14 00:46:55.992349 ignition[855]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 14 00:46:55.992349 ignition[855]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 14 00:46:55.992349 ignition[855]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 14 00:46:55.992349 ignition[855]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 14 00:46:55.992349 ignition[855]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 14 00:46:55.992349 ignition[855]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 14 00:46:55.992349 ignition[855]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 14 00:46:55.992349 ignition[855]: INFO : files: op(f): [started] setting preset to disabled for "coreos-metadata.service" May 14 00:46:55.992349 ignition[855]: INFO : files: op(f): op(10): [started] removing enablement symlink(s) for "coreos-metadata.service" May 14 00:46:56.021534 ignition[855]: INFO : files: op(f): op(10): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 14 00:46:56.024094 ignition[855]: INFO : files: op(f): [finished] setting preset to disabled for "coreos-metadata.service" May 14 00:46:56.024094 ignition[855]: INFO : files: op(11): [started] setting preset to enabled for "prepare-helm.service" May 14 00:46:56.024094 ignition[855]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-helm.service" May 14 00:46:56.024094 ignition[855]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 14 00:46:56.024094 ignition[855]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 14 00:46:56.024094 ignition[855]: INFO : files: files passed May 14 00:46:56.024094 ignition[855]: INFO : Ignition finished successfully May 14 00:46:56.037924 kernel: kauditd_printk_skb: 23 callbacks suppressed May 14 00:46:56.037946 kernel: audit: type=1130 audit(1747183616.024:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.023984 systemd[1]: Finished ignition-files.service. May 14 00:46:56.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.025737 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 14 00:46:56.047857 kernel: audit: type=1130 audit(1747183616.038:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.047878 kernel: audit: type=1130 audit(1747183616.042:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.047888 kernel: audit: type=1131 audit(1747183616.042:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.031455 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 14 00:46:56.050249 initrd-setup-root-after-ignition[878]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 14 00:46:56.032261 systemd[1]: Starting ignition-quench.service... May 14 00:46:56.052965 initrd-setup-root-after-ignition[881]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 14 00:46:56.037142 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 14 00:46:56.038975 systemd[1]: ignition-quench.service: Deactivated successfully. May 14 00:46:56.039047 systemd[1]: Finished ignition-quench.service. May 14 00:46:56.042684 systemd[1]: Reached target ignition-complete.target. May 14 00:46:56.049324 systemd[1]: Starting initrd-parse-etc.service... May 14 00:46:56.061716 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 14 00:46:56.061806 systemd[1]: Finished initrd-parse-etc.service. May 14 00:46:56.068475 kernel: audit: type=1130 audit(1747183616.062:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.068498 kernel: audit: type=1131 audit(1747183616.062:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.063387 systemd[1]: Reached target initrd-fs.target. May 14 00:46:56.069157 systemd[1]: Reached target initrd.target. May 14 00:46:56.070489 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 14 00:46:56.071194 systemd[1]: Starting dracut-pre-pivot.service... May 14 00:46:56.081431 systemd[1]: Finished dracut-pre-pivot.service. May 14 00:46:56.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.082981 systemd[1]: Starting initrd-cleanup.service... May 14 00:46:56.086470 kernel: audit: type=1130 audit(1747183616.081:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.090825 systemd[1]: Stopped target nss-lookup.target. May 14 00:46:56.091742 systemd[1]: Stopped target remote-cryptsetup.target. May 14 00:46:56.093090 systemd[1]: Stopped target timers.target. May 14 00:46:56.094386 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 14 00:46:56.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.094536 systemd[1]: Stopped dracut-pre-pivot.service. May 14 00:46:56.100210 kernel: audit: type=1131 audit(1747183616.095:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.095876 systemd[1]: Stopped target initrd.target. May 14 00:46:56.099665 systemd[1]: Stopped target basic.target. May 14 00:46:56.100905 systemd[1]: Stopped target ignition-complete.target. May 14 00:46:56.102228 systemd[1]: Stopped target ignition-diskful.target. May 14 00:46:56.103553 systemd[1]: Stopped target initrd-root-device.target. May 14 00:46:56.104985 systemd[1]: Stopped target remote-fs.target. May 14 00:46:56.106294 systemd[1]: Stopped target remote-fs-pre.target. May 14 00:46:56.107841 systemd[1]: Stopped target sysinit.target. May 14 00:46:56.109075 systemd[1]: Stopped target local-fs.target. May 14 00:46:56.110357 systemd[1]: Stopped target local-fs-pre.target. May 14 00:46:56.111651 systemd[1]: Stopped target swap.target. May 14 00:46:56.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.112852 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 14 00:46:56.118416 kernel: audit: type=1131 audit(1747183616.113:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.112972 systemd[1]: Stopped dracut-pre-mount.service. May 14 00:46:56.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.114273 systemd[1]: Stopped target cryptsetup.target. May 14 00:46:56.123648 kernel: audit: type=1131 audit(1747183616.118:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.117701 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 14 00:46:56.117808 systemd[1]: Stopped dracut-initqueue.service. May 14 00:46:56.119233 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 14 00:46:56.119327 systemd[1]: Stopped ignition-fetch-offline.service. May 14 00:46:56.123154 systemd[1]: Stopped target paths.target. May 14 00:46:56.124278 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 14 00:46:56.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.125432 systemd[1]: Stopped systemd-ask-password-console.path. May 14 00:46:56.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.126620 systemd[1]: Stopped target slices.target. May 14 00:46:56.128089 systemd[1]: Stopped target sockets.target. May 14 00:46:56.134856 iscsid[746]: iscsid shutting down. May 14 00:46:56.129420 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 14 00:46:56.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.129532 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 14 00:46:56.130875 systemd[1]: ignition-files.service: Deactivated successfully. May 14 00:46:56.130964 systemd[1]: Stopped ignition-files.service. May 14 00:46:56.133198 systemd[1]: Stopping ignition-mount.service... May 14 00:46:56.134412 systemd[1]: Stopping iscsid.service... May 14 00:46:56.135321 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 14 00:46:56.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.145126 ignition[895]: INFO : Ignition 2.14.0 May 14 00:46:56.145126 ignition[895]: INFO : Stage: umount May 14 00:46:56.145126 ignition[895]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:46:56.145126 ignition[895]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:46:56.145126 ignition[895]: INFO : umount: umount passed May 14 00:46:56.145126 ignition[895]: INFO : Ignition finished successfully May 14 00:46:56.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.135452 systemd[1]: Stopped kmod-static-nodes.service. May 14 00:46:56.137578 systemd[1]: Stopping sysroot-boot.service... May 14 00:46:56.138437 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 14 00:46:56.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.138573 systemd[1]: Stopped systemd-udev-trigger.service. May 14 00:46:56.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.140103 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 14 00:46:56.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.140204 systemd[1]: Stopped dracut-pre-trigger.service. May 14 00:46:56.142877 systemd[1]: iscsid.service: Deactivated successfully. May 14 00:46:56.142970 systemd[1]: Stopped iscsid.service. May 14 00:46:56.144594 systemd[1]: iscsid.socket: Deactivated successfully. May 14 00:46:56.144655 systemd[1]: Closed iscsid.socket. May 14 00:46:56.146322 systemd[1]: Stopping iscsiuio.service... May 14 00:46:56.147183 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 14 00:46:56.147266 systemd[1]: Finished initrd-cleanup.service. May 14 00:46:56.148497 systemd[1]: iscsiuio.service: Deactivated successfully. May 14 00:46:56.148584 systemd[1]: Stopped iscsiuio.service. May 14 00:46:56.150747 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 14 00:46:56.151139 systemd[1]: ignition-mount.service: Deactivated successfully. May 14 00:46:56.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.151227 systemd[1]: Stopped ignition-mount.service. May 14 00:46:56.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.153116 systemd[1]: Stopped target network.target. May 14 00:46:56.153975 systemd[1]: iscsiuio.socket: Deactivated successfully. May 14 00:46:56.177000 audit: BPF prog-id=6 op=UNLOAD May 14 00:46:56.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.154012 systemd[1]: Closed iscsiuio.socket. May 14 00:46:56.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.155230 systemd[1]: ignition-disks.service: Deactivated successfully. May 14 00:46:56.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.155273 systemd[1]: Stopped ignition-disks.service. May 14 00:46:56.156544 systemd[1]: ignition-kargs.service: Deactivated successfully. May 14 00:46:56.156585 systemd[1]: Stopped ignition-kargs.service. May 14 00:46:56.158283 systemd[1]: ignition-setup.service: Deactivated successfully. May 14 00:46:56.158321 systemd[1]: Stopped ignition-setup.service. May 14 00:46:56.159718 systemd[1]: Stopping systemd-networkd.service... May 14 00:46:56.161221 systemd[1]: Stopping systemd-resolved.service... May 14 00:46:56.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.170443 systemd-networkd[739]: eth0: DHCPv6 lease lost May 14 00:46:56.193000 audit: BPF prog-id=9 op=UNLOAD May 14 00:46:56.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.170495 systemd[1]: systemd-resolved.service: Deactivated successfully. May 14 00:46:56.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.170594 systemd[1]: Stopped systemd-resolved.service. May 14 00:46:56.172532 systemd[1]: systemd-networkd.service: Deactivated successfully. May 14 00:46:56.172623 systemd[1]: Stopped systemd-networkd.service. May 14 00:46:56.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.173934 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 14 00:46:56.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.173964 systemd[1]: Closed systemd-networkd.socket. May 14 00:46:56.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.175622 systemd[1]: Stopping network-cleanup.service... May 14 00:46:56.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.176588 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 14 00:46:56.176652 systemd[1]: Stopped parse-ip-for-networkd.service. May 14 00:46:56.178150 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 14 00:46:56.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.178205 systemd[1]: Stopped systemd-sysctl.service. May 14 00:46:56.180033 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 14 00:46:56.180080 systemd[1]: Stopped systemd-modules-load.service. May 14 00:46:56.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.184969 systemd[1]: Stopping systemd-udevd.service... May 14 00:46:56.187503 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 14 00:46:56.192320 systemd[1]: systemd-udevd.service: Deactivated successfully. May 14 00:46:56.192594 systemd[1]: Stopped systemd-udevd.service. May 14 00:46:56.193908 systemd[1]: network-cleanup.service: Deactivated successfully. May 14 00:46:56.193991 systemd[1]: Stopped network-cleanup.service. May 14 00:46:56.195146 systemd[1]: sysroot-boot.service: Deactivated successfully. May 14 00:46:56.195234 systemd[1]: Stopped sysroot-boot.service. May 14 00:46:56.196370 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 14 00:46:56.196417 systemd[1]: Closed systemd-udevd-control.socket. May 14 00:46:56.197737 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 14 00:46:56.197771 systemd[1]: Closed systemd-udevd-kernel.socket. May 14 00:46:56.199029 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 14 00:46:56.199078 systemd[1]: Stopped dracut-pre-udev.service. May 14 00:46:56.200621 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 14 00:46:56.200661 systemd[1]: Stopped dracut-cmdline.service. May 14 00:46:56.201879 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 14 00:46:56.201917 systemd[1]: Stopped dracut-cmdline-ask.service. May 14 00:46:56.203366 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 14 00:46:56.203423 systemd[1]: Stopped initrd-setup-root.service. May 14 00:46:56.205472 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 14 00:46:56.207066 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 14 00:46:56.207132 systemd[1]: Stopped systemd-vconsole-setup.service. May 14 00:46:56.210621 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 14 00:46:56.210707 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 14 00:46:56.211897 systemd[1]: Reached target initrd-switch-root.target. May 14 00:46:56.213972 systemd[1]: Starting initrd-switch-root.service... May 14 00:46:56.220613 systemd[1]: Switching root. May 14 00:46:56.239824 systemd-journald[290]: Journal stopped May 14 00:46:58.283620 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). May 14 00:46:58.283682 kernel: SELinux: Class mctp_socket not defined in policy. May 14 00:46:58.283696 kernel: SELinux: Class anon_inode not defined in policy. May 14 00:46:58.283706 kernel: SELinux: the above unknown classes and permissions will be allowed May 14 00:46:58.283718 kernel: SELinux: policy capability network_peer_controls=1 May 14 00:46:58.283769 kernel: SELinux: policy capability open_perms=1 May 14 00:46:58.283783 kernel: SELinux: policy capability extended_socket_class=1 May 14 00:46:58.283793 kernel: SELinux: policy capability always_check_network=0 May 14 00:46:58.283803 kernel: SELinux: policy capability cgroup_seclabel=1 May 14 00:46:58.283813 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 14 00:46:58.283822 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 14 00:46:58.283858 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 14 00:46:58.283874 systemd[1]: Successfully loaded SELinux policy in 35.445ms. May 14 00:46:58.283896 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.710ms. May 14 00:46:58.283908 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 14 00:46:58.283920 systemd[1]: Detected virtualization kvm. May 14 00:46:58.283930 systemd[1]: Detected architecture arm64. May 14 00:46:58.283940 systemd[1]: Detected first boot. May 14 00:46:58.283950 systemd[1]: Initializing machine ID from VM UUID. May 14 00:46:58.283960 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 14 00:46:58.283970 systemd[1]: Populated /etc with preset unit settings. May 14 00:46:58.283981 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:46:58.283995 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:46:58.284006 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:46:58.284018 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 14 00:46:58.284029 systemd[1]: Stopped initrd-switch-root.service. May 14 00:46:58.284040 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 14 00:46:58.284050 systemd[1]: Created slice system-addon\x2dconfig.slice. May 14 00:46:58.284061 systemd[1]: Created slice system-addon\x2drun.slice. May 14 00:46:58.284076 systemd[1]: Created slice system-getty.slice. May 14 00:46:58.284087 systemd[1]: Created slice system-modprobe.slice. May 14 00:46:58.284097 systemd[1]: Created slice system-serial\x2dgetty.slice. May 14 00:46:58.284107 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 14 00:46:58.284121 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 14 00:46:58.284131 systemd[1]: Created slice user.slice. May 14 00:46:58.284143 systemd[1]: Started systemd-ask-password-console.path. May 14 00:46:58.284153 systemd[1]: Started systemd-ask-password-wall.path. May 14 00:46:58.284164 systemd[1]: Set up automount boot.automount. May 14 00:46:58.284174 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 14 00:46:58.284184 systemd[1]: Stopped target initrd-switch-root.target. May 14 00:46:58.284200 systemd[1]: Stopped target initrd-fs.target. May 14 00:46:58.284210 systemd[1]: Stopped target initrd-root-fs.target. May 14 00:46:58.284221 systemd[1]: Reached target integritysetup.target. May 14 00:46:58.284231 systemd[1]: Reached target remote-cryptsetup.target. May 14 00:46:58.284241 systemd[1]: Reached target remote-fs.target. May 14 00:46:58.284252 systemd[1]: Reached target slices.target. May 14 00:46:58.284262 systemd[1]: Reached target swap.target. May 14 00:46:58.284272 systemd[1]: Reached target torcx.target. May 14 00:46:58.284282 systemd[1]: Reached target veritysetup.target. May 14 00:46:58.284292 systemd[1]: Listening on systemd-coredump.socket. May 14 00:46:58.284303 systemd[1]: Listening on systemd-initctl.socket. May 14 00:46:58.284313 systemd[1]: Listening on systemd-networkd.socket. May 14 00:46:58.284325 systemd[1]: Listening on systemd-udevd-control.socket. May 14 00:46:58.284335 systemd[1]: Listening on systemd-udevd-kernel.socket. May 14 00:46:58.284345 systemd[1]: Listening on systemd-userdbd.socket. May 14 00:46:58.284355 systemd[1]: Mounting dev-hugepages.mount... May 14 00:46:58.284366 systemd[1]: Mounting dev-mqueue.mount... May 14 00:46:58.284375 systemd[1]: Mounting media.mount... May 14 00:46:58.284386 systemd[1]: Mounting sys-kernel-debug.mount... May 14 00:46:58.284404 systemd[1]: Mounting sys-kernel-tracing.mount... May 14 00:46:58.284414 systemd[1]: Mounting tmp.mount... May 14 00:46:58.284426 systemd[1]: Starting flatcar-tmpfiles.service... May 14 00:46:58.284436 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:46:58.284446 systemd[1]: Starting kmod-static-nodes.service... May 14 00:46:58.284457 systemd[1]: Starting modprobe@configfs.service... May 14 00:46:58.284467 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:46:58.284477 systemd[1]: Starting modprobe@drm.service... May 14 00:46:58.284487 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:46:58.284498 systemd[1]: Starting modprobe@fuse.service... May 14 00:46:58.284507 systemd[1]: Starting modprobe@loop.service... May 14 00:46:58.284519 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 14 00:46:58.284530 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 14 00:46:58.284540 systemd[1]: Stopped systemd-fsck-root.service. May 14 00:46:58.284550 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 14 00:46:58.284564 systemd[1]: Stopped systemd-fsck-usr.service. May 14 00:46:58.284575 systemd[1]: Stopped systemd-journald.service. May 14 00:46:58.284588 kernel: fuse: init (API version 7.34) May 14 00:46:58.284600 systemd[1]: Starting systemd-journald.service... May 14 00:46:58.284610 kernel: loop: module loaded May 14 00:46:58.284621 systemd[1]: Starting systemd-modules-load.service... May 14 00:46:58.284631 systemd[1]: Starting systemd-network-generator.service... May 14 00:46:58.284641 systemd[1]: Starting systemd-remount-fs.service... May 14 00:46:58.284651 systemd[1]: Starting systemd-udev-trigger.service... May 14 00:46:58.284662 systemd[1]: verity-setup.service: Deactivated successfully. May 14 00:46:58.284672 systemd[1]: Stopped verity-setup.service. May 14 00:46:58.284682 systemd[1]: Mounted dev-hugepages.mount. May 14 00:46:58.284692 systemd[1]: Mounted dev-mqueue.mount. May 14 00:46:58.284704 systemd-journald[993]: Journal started May 14 00:46:58.284747 systemd-journald[993]: Runtime Journal (/run/log/journal/17049698923246c7b388fb85aa5f1e61) is 6.0M, max 48.7M, 42.6M free. May 14 00:46:56.302000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 14 00:46:56.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 14 00:46:56.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 14 00:46:56.456000 audit: BPF prog-id=10 op=LOAD May 14 00:46:56.456000 audit: BPF prog-id=10 op=UNLOAD May 14 00:46:56.456000 audit: BPF prog-id=11 op=LOAD May 14 00:46:56.456000 audit: BPF prog-id=11 op=UNLOAD May 14 00:46:56.496000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 14 00:46:56.496000 audit[927]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001cd8a2 a1=4000150de0 a2=40001570c0 a3=32 items=0 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:46:56.496000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 14 00:46:56.497000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 14 00:46:56.497000 audit[927]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001cd979 a2=1ed a3=0 items=2 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:46:56.497000 audit: CWD cwd="/" May 14 00:46:56.497000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:46:56.497000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:46:56.497000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 14 00:46:58.163000 audit: BPF prog-id=12 op=LOAD May 14 00:46:58.163000 audit: BPF prog-id=3 op=UNLOAD May 14 00:46:58.163000 audit: BPF prog-id=13 op=LOAD May 14 00:46:58.163000 audit: BPF prog-id=14 op=LOAD May 14 00:46:58.163000 audit: BPF prog-id=4 op=UNLOAD May 14 00:46:58.163000 audit: BPF prog-id=5 op=UNLOAD May 14 00:46:58.164000 audit: BPF prog-id=15 op=LOAD May 14 00:46:58.164000 audit: BPF prog-id=12 op=UNLOAD May 14 00:46:58.164000 audit: BPF prog-id=16 op=LOAD May 14 00:46:58.164000 audit: BPF prog-id=17 op=LOAD May 14 00:46:58.164000 audit: BPF prog-id=13 op=UNLOAD May 14 00:46:58.164000 audit: BPF prog-id=14 op=UNLOAD May 14 00:46:58.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.285427 systemd[1]: Started systemd-journald.service. May 14 00:46:58.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.177000 audit: BPF prog-id=15 op=UNLOAD May 14 00:46:58.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.262000 audit: BPF prog-id=18 op=LOAD May 14 00:46:58.262000 audit: BPF prog-id=19 op=LOAD May 14 00:46:58.262000 audit: BPF prog-id=20 op=LOAD May 14 00:46:58.262000 audit: BPF prog-id=16 op=UNLOAD May 14 00:46:58.262000 audit: BPF prog-id=17 op=UNLOAD May 14 00:46:58.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.282000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 14 00:46:58.282000 audit[993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffcd223b10 a2=4000 a3=1 items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:46:58.282000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 14 00:46:58.162128 systemd[1]: Queued start job for default target multi-user.target. May 14 00:46:56.495135 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:46:58.162139 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 14 00:46:56.495379 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 14 00:46:58.164970 systemd[1]: systemd-journald.service: Deactivated successfully. May 14 00:46:56.495409 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 14 00:46:56.495437 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 14 00:46:56.495447 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=debug msg="skipped missing lower profile" missing profile=oem May 14 00:46:56.495473 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 14 00:46:56.495485 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 14 00:46:56.495670 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 14 00:46:56.495702 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 14 00:46:56.495714 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 14 00:46:56.496086 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 14 00:46:56.496117 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 14 00:46:56.496134 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 14 00:46:58.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:56.496147 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 14 00:46:56.496163 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 14 00:46:56.496188 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 14 00:46:57.920895 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:57Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:46:57.921153 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:57Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:46:57.921265 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:57Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:46:57.921454 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:57Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:46:57.921503 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:57Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 14 00:46:57.921560 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-14T00:46:57Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 14 00:46:58.287354 systemd[1]: Mounted media.mount. May 14 00:46:58.288125 systemd[1]: Mounted sys-kernel-debug.mount. May 14 00:46:58.288995 systemd[1]: Mounted sys-kernel-tracing.mount. May 14 00:46:58.289906 systemd[1]: Mounted tmp.mount. May 14 00:46:58.290764 systemd[1]: Finished kmod-static-nodes.service. May 14 00:46:58.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.291791 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 14 00:46:58.291947 systemd[1]: Finished modprobe@configfs.service. May 14 00:46:58.292982 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:46:58.293122 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:46:58.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.294239 systemd[1]: modprobe@drm.service: Deactivated successfully. May 14 00:46:58.294385 systemd[1]: Finished modprobe@drm.service. May 14 00:46:58.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.295378 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:46:58.295530 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:46:58.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.296683 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 14 00:46:58.296829 systemd[1]: Finished modprobe@fuse.service. May 14 00:46:58.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.297884 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:46:58.298042 systemd[1]: Finished modprobe@loop.service. May 14 00:46:58.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.299074 systemd[1]: Finished systemd-modules-load.service. May 14 00:46:58.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.300317 systemd[1]: Finished systemd-network-generator.service. May 14 00:46:58.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.301497 systemd[1]: Finished systemd-remount-fs.service. May 14 00:46:58.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.302799 systemd[1]: Reached target network-pre.target. May 14 00:46:58.304769 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 14 00:46:58.306671 systemd[1]: Mounting sys-kernel-config.mount... May 14 00:46:58.307402 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 14 00:46:58.308897 systemd[1]: Starting systemd-hwdb-update.service... May 14 00:46:58.310804 systemd[1]: Starting systemd-journal-flush.service... May 14 00:46:58.311703 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:46:58.312623 systemd[1]: Starting systemd-random-seed.service... May 14 00:46:58.313506 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:46:58.314562 systemd[1]: Starting systemd-sysctl.service... May 14 00:46:58.319195 systemd[1]: Finished flatcar-tmpfiles.service. May 14 00:46:58.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.320246 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 14 00:46:58.321367 systemd[1]: Mounted sys-kernel-config.mount. May 14 00:46:58.322490 systemd-journald[993]: Time spent on flushing to /var/log/journal/17049698923246c7b388fb85aa5f1e61 is 15.428ms for 995 entries. May 14 00:46:58.322490 systemd-journald[993]: System Journal (/var/log/journal/17049698923246c7b388fb85aa5f1e61) is 8.0M, max 195.6M, 187.6M free. May 14 00:46:58.347175 systemd-journald[993]: Received client request to flush runtime journal. May 14 00:46:58.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.323270 systemd[1]: Starting systemd-sysusers.service... May 14 00:46:58.325899 systemd[1]: Finished systemd-udev-trigger.service. May 14 00:46:58.327542 systemd[1]: Finished systemd-random-seed.service. May 14 00:46:58.348379 udevadm[1028]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 14 00:46:58.328500 systemd[1]: Reached target first-boot-complete.target. May 14 00:46:58.330873 systemd[1]: Starting systemd-udev-settle.service... May 14 00:46:58.335947 systemd[1]: Finished systemd-sysctl.service. May 14 00:46:58.339536 systemd[1]: Finished systemd-sysusers.service. May 14 00:46:58.348034 systemd[1]: Finished systemd-journal-flush.service. May 14 00:46:58.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.696001 systemd[1]: Finished systemd-hwdb-update.service. May 14 00:46:58.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.697000 audit: BPF prog-id=21 op=LOAD May 14 00:46:58.697000 audit: BPF prog-id=22 op=LOAD May 14 00:46:58.697000 audit: BPF prog-id=7 op=UNLOAD May 14 00:46:58.697000 audit: BPF prog-id=8 op=UNLOAD May 14 00:46:58.698286 systemd[1]: Starting systemd-udevd.service... May 14 00:46:58.713312 systemd-udevd[1030]: Using default interface naming scheme 'v252'. May 14 00:46:58.728850 systemd[1]: Started systemd-udevd.service. May 14 00:46:58.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.732000 audit: BPF prog-id=23 op=LOAD May 14 00:46:58.737226 systemd[1]: Starting systemd-networkd.service... May 14 00:46:58.747634 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 14 00:46:58.754000 audit: BPF prog-id=24 op=LOAD May 14 00:46:58.754000 audit: BPF prog-id=25 op=LOAD May 14 00:46:58.754000 audit: BPF prog-id=26 op=LOAD May 14 00:46:58.755348 systemd[1]: Starting systemd-userdbd.service... May 14 00:46:58.787792 systemd[1]: Started systemd-userdbd.service. May 14 00:46:58.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.808934 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 14 00:46:58.832783 systemd[1]: Finished systemd-udev-settle.service. May 14 00:46:58.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.835071 systemd[1]: Starting lvm2-activation-early.service... May 14 00:46:58.837120 systemd-networkd[1050]: lo: Link UP May 14 00:46:58.837128 systemd-networkd[1050]: lo: Gained carrier May 14 00:46:58.837639 systemd-networkd[1050]: Enumeration completed May 14 00:46:58.837736 systemd[1]: Started systemd-networkd.service. May 14 00:46:58.837754 systemd-networkd[1050]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 14 00:46:58.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.842062 systemd-networkd[1050]: eth0: Link UP May 14 00:46:58.842071 systemd-networkd[1050]: eth0: Gained carrier May 14 00:46:58.850211 lvm[1063]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 14 00:46:58.857541 systemd-networkd[1050]: eth0: DHCPv4 address 10.0.0.97/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 14 00:46:58.873333 systemd[1]: Finished lvm2-activation-early.service. May 14 00:46:58.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.874474 systemd[1]: Reached target cryptsetup.target. May 14 00:46:58.876422 systemd[1]: Starting lvm2-activation.service... May 14 00:46:58.879945 lvm[1064]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 14 00:46:58.907369 systemd[1]: Finished lvm2-activation.service. May 14 00:46:58.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.908282 systemd[1]: Reached target local-fs-pre.target. May 14 00:46:58.909117 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 14 00:46:58.909146 systemd[1]: Reached target local-fs.target. May 14 00:46:58.909903 systemd[1]: Reached target machines.target. May 14 00:46:58.911860 systemd[1]: Starting ldconfig.service... May 14 00:46:58.912865 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:46:58.912915 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:46:58.913916 systemd[1]: Starting systemd-boot-update.service... May 14 00:46:58.915712 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 14 00:46:58.917876 systemd[1]: Starting systemd-machine-id-commit.service... May 14 00:46:58.919739 systemd[1]: Starting systemd-sysext.service... May 14 00:46:58.921138 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1066 (bootctl) May 14 00:46:58.922087 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 14 00:46:58.929372 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 14 00:46:58.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.932123 systemd[1]: Unmounting usr-share-oem.mount... May 14 00:46:58.940237 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 14 00:46:58.940440 systemd[1]: Unmounted usr-share-oem.mount. May 14 00:46:58.950426 kernel: loop0: detected capacity change from 0 to 201592 May 14 00:46:58.984554 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 14 00:46:58.985815 systemd[1]: Finished systemd-machine-id-commit.service. May 14 00:46:58.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:58.990492 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 14 00:46:59.007259 systemd-fsck[1077]: fsck.fat 4.2 (2021-01-31) May 14 00:46:59.007259 systemd-fsck[1077]: /dev/vda1: 236 files, 117310/258078 clusters May 14 00:46:59.009055 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 14 00:46:59.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.012417 systemd[1]: Mounting boot.mount... May 14 00:46:59.015410 kernel: loop1: detected capacity change from 0 to 201592 May 14 00:46:59.020694 (sd-sysext)[1081]: Using extensions 'kubernetes'. May 14 00:46:59.021012 (sd-sysext)[1081]: Merged extensions into '/usr'. May 14 00:46:59.030848 systemd[1]: Mounted boot.mount. May 14 00:46:59.038324 systemd[1]: Finished systemd-boot-update.service. May 14 00:46:59.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.044782 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:46:59.046232 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:46:59.048323 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:46:59.050445 systemd[1]: Starting modprobe@loop.service... May 14 00:46:59.051337 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:46:59.051484 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:46:59.052168 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:46:59.052351 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:46:59.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.053803 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:46:59.053919 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:46:59.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.055382 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:46:59.055505 systemd[1]: Finished modprobe@loop.service. May 14 00:46:59.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.056927 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:46:59.057041 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:46:59.094960 ldconfig[1065]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 14 00:46:59.110687 systemd[1]: Finished ldconfig.service. May 14 00:46:59.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.283608 systemd[1]: Mounting usr-share-oem.mount... May 14 00:46:59.288631 systemd[1]: Mounted usr-share-oem.mount. May 14 00:46:59.290458 systemd[1]: Finished systemd-sysext.service. May 14 00:46:59.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.292464 systemd[1]: Starting ensure-sysext.service... May 14 00:46:59.294243 systemd[1]: Starting systemd-tmpfiles-setup.service... May 14 00:46:59.298741 systemd[1]: Reloading. May 14 00:46:59.305706 systemd-tmpfiles[1088]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 14 00:46:59.309735 systemd-tmpfiles[1088]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 14 00:46:59.322465 systemd-tmpfiles[1088]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 14 00:46:59.337743 /usr/lib/systemd/system-generators/torcx-generator[1108]: time="2025-05-14T00:46:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:46:59.337865 /usr/lib/systemd/system-generators/torcx-generator[1108]: time="2025-05-14T00:46:59Z" level=info msg="torcx already run" May 14 00:46:59.393123 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:46:59.393143 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:46:59.408318 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:46:59.453000 audit: BPF prog-id=27 op=LOAD May 14 00:46:59.453000 audit: BPF prog-id=18 op=UNLOAD May 14 00:46:59.453000 audit: BPF prog-id=28 op=LOAD May 14 00:46:59.453000 audit: BPF prog-id=29 op=LOAD May 14 00:46:59.453000 audit: BPF prog-id=19 op=UNLOAD May 14 00:46:59.453000 audit: BPF prog-id=20 op=UNLOAD May 14 00:46:59.453000 audit: BPF prog-id=30 op=LOAD May 14 00:46:59.453000 audit: BPF prog-id=31 op=LOAD May 14 00:46:59.453000 audit: BPF prog-id=21 op=UNLOAD May 14 00:46:59.453000 audit: BPF prog-id=22 op=UNLOAD May 14 00:46:59.454000 audit: BPF prog-id=32 op=LOAD May 14 00:46:59.454000 audit: BPF prog-id=23 op=UNLOAD May 14 00:46:59.455000 audit: BPF prog-id=33 op=LOAD May 14 00:46:59.455000 audit: BPF prog-id=24 op=UNLOAD May 14 00:46:59.455000 audit: BPF prog-id=34 op=LOAD May 14 00:46:59.455000 audit: BPF prog-id=35 op=LOAD May 14 00:46:59.455000 audit: BPF prog-id=25 op=UNLOAD May 14 00:46:59.455000 audit: BPF prog-id=26 op=UNLOAD May 14 00:46:59.457717 systemd[1]: Finished systemd-tmpfiles-setup.service. May 14 00:46:59.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.462145 systemd[1]: Starting audit-rules.service... May 14 00:46:59.464087 systemd[1]: Starting clean-ca-certificates.service... May 14 00:46:59.466169 systemd[1]: Starting systemd-journal-catalog-update.service... May 14 00:46:59.470000 audit: BPF prog-id=36 op=LOAD May 14 00:46:59.474000 audit: BPF prog-id=37 op=LOAD May 14 00:46:59.471975 systemd[1]: Starting systemd-resolved.service... May 14 00:46:59.475524 systemd[1]: Starting systemd-timesyncd.service... May 14 00:46:59.477304 systemd[1]: Starting systemd-update-utmp.service... May 14 00:46:59.480317 systemd[1]: Finished clean-ca-certificates.service. May 14 00:46:59.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.482891 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:46:59.484038 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:46:59.485000 audit[1154]: SYSTEM_BOOT pid=1154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 14 00:46:59.485955 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:46:59.487990 systemd[1]: Starting modprobe@loop.service... May 14 00:46:59.488839 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:46:59.488960 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:46:59.489060 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:46:59.489893 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:46:59.490024 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:46:59.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.491287 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:46:59.491409 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:46:59.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.492668 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:46:59.492775 systemd[1]: Finished modprobe@loop.service. May 14 00:46:59.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.495589 systemd[1]: Finished systemd-journal-catalog-update.service. May 14 00:46:59.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.498025 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:46:59.499162 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:46:59.500938 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:46:59.503139 systemd[1]: Starting modprobe@loop.service... May 14 00:46:59.505166 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:46:59.505327 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:46:59.506759 systemd[1]: Starting systemd-update-done.service... May 14 00:46:59.507715 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:46:59.508719 systemd[1]: Finished systemd-update-utmp.service. May 14 00:46:59.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.510272 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:46:59.510404 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:46:59.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.511701 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:46:59.511812 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:46:59.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.513145 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:46:59.513264 systemd[1]: Finished modprobe@loop.service. May 14 00:46:59.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.514460 systemd[1]: Finished systemd-update-done.service. May 14 00:46:59.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.518556 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:46:59.520013 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:46:59.522148 systemd[1]: Starting modprobe@drm.service... May 14 00:46:59.524057 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:46:59.526143 systemd[1]: Starting modprobe@loop.service... May 14 00:46:59.527118 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:46:59.527266 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:46:59.528567 systemd[1]: Starting systemd-networkd-wait-online.service... May 14 00:46:59.529729 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:46:59.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.530716 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:46:59.530845 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:46:59.532122 systemd[1]: modprobe@drm.service: Deactivated successfully. May 14 00:46:59.532257 systemd[1]: Finished modprobe@drm.service. May 14 00:46:59.533470 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:46:59.533584 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:46:59.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.534842 systemd[1]: Started systemd-timesyncd.service. May 14 00:46:59.534963 systemd-timesyncd[1151]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 14 00:46:59.535011 systemd-timesyncd[1151]: Initial clock synchronization to Wed 2025-05-14 00:46:59.705230 UTC. May 14 00:46:59.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.536215 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:46:59.536338 systemd[1]: Finished modprobe@loop.service. May 14 00:46:59.537814 systemd[1]: Reached target time-set.target. May 14 00:46:59.538741 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:46:59.538777 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:46:59.539853 systemd[1]: Finished ensure-sysext.service. May 14 00:46:59.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:46:59.542000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 14 00:46:59.542000 audit[1180]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffa80d980 a2=420 a3=0 items=0 ppid=1146 pid=1180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:46:59.542000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 14 00:46:59.543142 augenrules[1180]: No rules May 14 00:46:59.543939 systemd[1]: Finished audit-rules.service. May 14 00:46:59.547167 systemd-resolved[1150]: Positive Trust Anchors: May 14 00:46:59.547432 systemd-resolved[1150]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 14 00:46:59.547511 systemd-resolved[1150]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 14 00:46:59.561304 systemd-resolved[1150]: Defaulting to hostname 'linux'. May 14 00:46:59.562781 systemd[1]: Started systemd-resolved.service. May 14 00:46:59.563702 systemd[1]: Reached target network.target. May 14 00:46:59.564466 systemd[1]: Reached target nss-lookup.target. May 14 00:46:59.565214 systemd[1]: Reached target sysinit.target. May 14 00:46:59.566066 systemd[1]: Started motdgen.path. May 14 00:46:59.566791 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 14 00:46:59.568004 systemd[1]: Started logrotate.timer. May 14 00:46:59.568867 systemd[1]: Started mdadm.timer. May 14 00:46:59.569550 systemd[1]: Started systemd-tmpfiles-clean.timer. May 14 00:46:59.570358 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 14 00:46:59.570386 systemd[1]: Reached target paths.target. May 14 00:46:59.571107 systemd[1]: Reached target timers.target. May 14 00:46:59.572195 systemd[1]: Listening on dbus.socket. May 14 00:46:59.573978 systemd[1]: Starting docker.socket... May 14 00:46:59.576975 systemd[1]: Listening on sshd.socket. May 14 00:46:59.577819 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:46:59.578245 systemd[1]: Listening on docker.socket. May 14 00:46:59.579117 systemd[1]: Reached target sockets.target. May 14 00:46:59.579900 systemd[1]: Reached target basic.target. May 14 00:46:59.580672 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 14 00:46:59.580704 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 14 00:46:59.581662 systemd[1]: Starting containerd.service... May 14 00:46:59.583363 systemd[1]: Starting dbus.service... May 14 00:46:59.585017 systemd[1]: Starting enable-oem-cloudinit.service... May 14 00:46:59.586937 systemd[1]: Starting extend-filesystems.service... May 14 00:46:59.587860 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 14 00:46:59.589126 systemd[1]: Starting motdgen.service... May 14 00:46:59.596276 jq[1189]: false May 14 00:46:59.592576 systemd[1]: Starting prepare-helm.service... May 14 00:46:59.594467 systemd[1]: Starting ssh-key-proc-cmdline.service... May 14 00:46:59.596708 systemd[1]: Starting sshd-keygen.service... May 14 00:46:59.599556 systemd[1]: Starting systemd-logind.service... May 14 00:46:59.600412 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:46:59.600506 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 14 00:46:59.600924 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 14 00:46:59.601669 systemd[1]: Starting update-engine.service... May 14 00:46:59.603778 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 14 00:46:59.606405 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 14 00:46:59.607475 jq[1203]: true May 14 00:46:59.606585 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 14 00:46:59.607683 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 14 00:46:59.607856 systemd[1]: Finished ssh-key-proc-cmdline.service. May 14 00:46:59.613694 systemd[1]: motdgen.service: Deactivated successfully. May 14 00:46:59.615349 systemd[1]: Finished motdgen.service. May 14 00:46:59.621174 extend-filesystems[1190]: Found loop1 May 14 00:46:59.621174 extend-filesystems[1190]: Found vda May 14 00:46:59.621174 extend-filesystems[1190]: Found vda1 May 14 00:46:59.621174 extend-filesystems[1190]: Found vda2 May 14 00:46:59.621174 extend-filesystems[1190]: Found vda3 May 14 00:46:59.621174 extend-filesystems[1190]: Found usr May 14 00:46:59.621174 extend-filesystems[1190]: Found vda4 May 14 00:46:59.621174 extend-filesystems[1190]: Found vda6 May 14 00:46:59.621174 extend-filesystems[1190]: Found vda7 May 14 00:46:59.621174 extend-filesystems[1190]: Found vda9 May 14 00:46:59.621174 extend-filesystems[1190]: Checking size of /dev/vda9 May 14 00:46:59.638047 jq[1210]: true May 14 00:46:59.633198 systemd[1]: Started dbus.service. May 14 00:46:59.633055 dbus-daemon[1188]: [system] SELinux support is enabled May 14 00:46:59.638350 tar[1209]: linux-arm64/LICENSE May 14 00:46:59.635830 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 14 00:46:59.635854 systemd[1]: Reached target system-config.target. May 14 00:46:59.636751 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 14 00:46:59.636768 systemd[1]: Reached target user-config.target. May 14 00:46:59.640952 tar[1209]: linux-arm64/helm May 14 00:46:59.650514 extend-filesystems[1190]: Resized partition /dev/vda9 May 14 00:46:59.658555 extend-filesystems[1226]: resize2fs 1.46.5 (30-Dec-2021) May 14 00:46:59.678405 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 14 00:46:59.704949 systemd-logind[1200]: Watching system buttons on /dev/input/event0 (Power Button) May 14 00:46:59.706522 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 14 00:46:59.709874 systemd-logind[1200]: New seat seat0. May 14 00:46:59.713237 systemd[1]: Started systemd-logind.service. May 14 00:46:59.726456 update_engine[1202]: I0514 00:46:59.724646 1202 main.cc:92] Flatcar Update Engine starting May 14 00:46:59.726806 extend-filesystems[1226]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 14 00:46:59.726806 extend-filesystems[1226]: old_desc_blocks = 1, new_desc_blocks = 1 May 14 00:46:59.726806 extend-filesystems[1226]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 14 00:46:59.731323 extend-filesystems[1190]: Resized filesystem in /dev/vda9 May 14 00:46:59.732129 bash[1239]: Updated "/home/core/.ssh/authorized_keys" May 14 00:46:59.727165 systemd[1]: extend-filesystems.service: Deactivated successfully. May 14 00:46:59.727330 systemd[1]: Finished extend-filesystems.service. May 14 00:46:59.731992 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 14 00:46:59.736634 systemd[1]: Started update-engine.service. May 14 00:46:59.736788 update_engine[1202]: I0514 00:46:59.736768 1202 update_check_scheduler.cc:74] Next update check in 5m55s May 14 00:46:59.739093 systemd[1]: Started locksmithd.service. May 14 00:46:59.763051 env[1212]: time="2025-05-14T00:46:59.762902640Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 14 00:46:59.783032 env[1212]: time="2025-05-14T00:46:59.782992480Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 14 00:46:59.783361 env[1212]: time="2025-05-14T00:46:59.783337320Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 14 00:46:59.786561 env[1212]: time="2025-05-14T00:46:59.785577840Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 14 00:46:59.786561 env[1212]: time="2025-05-14T00:46:59.785604880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 14 00:46:59.786561 env[1212]: time="2025-05-14T00:46:59.785785560Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 14 00:46:59.786561 env[1212]: time="2025-05-14T00:46:59.785802400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 14 00:46:59.786561 env[1212]: time="2025-05-14T00:46:59.785813680Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 14 00:46:59.786561 env[1212]: time="2025-05-14T00:46:59.785822240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 14 00:46:59.786561 env[1212]: time="2025-05-14T00:46:59.785899480Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 14 00:46:59.786561 env[1212]: time="2025-05-14T00:46:59.786161680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 14 00:46:59.786561 env[1212]: time="2025-05-14T00:46:59.786286120Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 14 00:46:59.786561 env[1212]: time="2025-05-14T00:46:59.786303160Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 14 00:46:59.786787 env[1212]: time="2025-05-14T00:46:59.786353800Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 14 00:46:59.786787 env[1212]: time="2025-05-14T00:46:59.786366600Z" level=info msg="metadata content store policy set" policy=shared May 14 00:46:59.793017 env[1212]: time="2025-05-14T00:46:59.792941640Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 14 00:46:59.793017 env[1212]: time="2025-05-14T00:46:59.792974880Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 14 00:46:59.793017 env[1212]: time="2025-05-14T00:46:59.792988200Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 14 00:46:59.793017 env[1212]: time="2025-05-14T00:46:59.793018840Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 14 00:46:59.793148 env[1212]: time="2025-05-14T00:46:59.793035280Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 14 00:46:59.793148 env[1212]: time="2025-05-14T00:46:59.793049440Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 14 00:46:59.793148 env[1212]: time="2025-05-14T00:46:59.793061440Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 14 00:46:59.793479 env[1212]: time="2025-05-14T00:46:59.793449480Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 14 00:46:59.793479 env[1212]: time="2025-05-14T00:46:59.793477080Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 14 00:46:59.793539 env[1212]: time="2025-05-14T00:46:59.793492080Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 14 00:46:59.793539 env[1212]: time="2025-05-14T00:46:59.793504960Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 14 00:46:59.793539 env[1212]: time="2025-05-14T00:46:59.793518600Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 14 00:46:59.793663 env[1212]: time="2025-05-14T00:46:59.793627680Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 14 00:46:59.793722 env[1212]: time="2025-05-14T00:46:59.793705280Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 14 00:46:59.793978 env[1212]: time="2025-05-14T00:46:59.793951160Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 14 00:46:59.794029 env[1212]: time="2025-05-14T00:46:59.793985600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794029 env[1212]: time="2025-05-14T00:46:59.793999360Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 14 00:46:59.794122 env[1212]: time="2025-05-14T00:46:59.794104600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794166 env[1212]: time="2025-05-14T00:46:59.794120640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794166 env[1212]: time="2025-05-14T00:46:59.794132840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794166 env[1212]: time="2025-05-14T00:46:59.794143600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794241 env[1212]: time="2025-05-14T00:46:59.794199800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794241 env[1212]: time="2025-05-14T00:46:59.794225640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794241 env[1212]: time="2025-05-14T00:46:59.794238280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794303 env[1212]: time="2025-05-14T00:46:59.794250080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794303 env[1212]: time="2025-05-14T00:46:59.794264440Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 14 00:46:59.794435 env[1212]: time="2025-05-14T00:46:59.794382680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794435 env[1212]: time="2025-05-14T00:46:59.794421080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794435 env[1212]: time="2025-05-14T00:46:59.794433840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794511 env[1212]: time="2025-05-14T00:46:59.794445440Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 14 00:46:59.794511 env[1212]: time="2025-05-14T00:46:59.794458720Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 14 00:46:59.794511 env[1212]: time="2025-05-14T00:46:59.794469760Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 14 00:46:59.794511 env[1212]: time="2025-05-14T00:46:59.794486200Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 14 00:46:59.794586 env[1212]: time="2025-05-14T00:46:59.794517320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 14 00:46:59.794751 env[1212]: time="2025-05-14T00:46:59.794696640Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 14 00:46:59.795287 env[1212]: time="2025-05-14T00:46:59.794752320Z" level=info msg="Connect containerd service" May 14 00:46:59.795287 env[1212]: time="2025-05-14T00:46:59.794779240Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 14 00:46:59.795721 env[1212]: time="2025-05-14T00:46:59.795564320Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 14 00:46:59.795884 env[1212]: time="2025-05-14T00:46:59.795854520Z" level=info msg="Start subscribing containerd event" May 14 00:46:59.795942 env[1212]: time="2025-05-14T00:46:59.795901760Z" level=info msg="Start recovering state" May 14 00:46:59.796180 env[1212]: time="2025-05-14T00:46:59.796115800Z" level=info msg="Start event monitor" May 14 00:46:59.796180 env[1212]: time="2025-05-14T00:46:59.796153000Z" level=info msg="Start snapshots syncer" May 14 00:46:59.796180 env[1212]: time="2025-05-14T00:46:59.796169520Z" level=info msg="Start cni network conf syncer for default" May 14 00:46:59.796180 env[1212]: time="2025-05-14T00:46:59.796177520Z" level=info msg="Start streaming server" May 14 00:46:59.798081 env[1212]: time="2025-05-14T00:46:59.796540160Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 14 00:46:59.798081 env[1212]: time="2025-05-14T00:46:59.796596800Z" level=info msg=serving... address=/run/containerd/containerd.sock May 14 00:46:59.798546 systemd[1]: Started containerd.service. May 14 00:46:59.800580 env[1212]: time="2025-05-14T00:46:59.799792800Z" level=info msg="containerd successfully booted in 0.037721s" May 14 00:46:59.811082 locksmithd[1241]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 14 00:47:00.074930 tar[1209]: linux-arm64/README.md May 14 00:47:00.079352 systemd[1]: Finished prepare-helm.service. May 14 00:47:00.720642 sshd_keygen[1211]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 14 00:47:00.739331 systemd[1]: Finished sshd-keygen.service. May 14 00:47:00.741645 systemd[1]: Starting issuegen.service... May 14 00:47:00.746868 systemd[1]: issuegen.service: Deactivated successfully. May 14 00:47:00.747025 systemd[1]: Finished issuegen.service. May 14 00:47:00.749146 systemd[1]: Starting systemd-user-sessions.service... May 14 00:47:00.755111 systemd[1]: Finished systemd-user-sessions.service. May 14 00:47:00.757323 systemd[1]: Started getty@tty1.service. May 14 00:47:00.759389 systemd[1]: Started serial-getty@ttyAMA0.service. May 14 00:47:00.760452 systemd[1]: Reached target getty.target. May 14 00:47:00.782583 systemd-networkd[1050]: eth0: Gained IPv6LL May 14 00:47:00.784244 systemd[1]: Finished systemd-networkd-wait-online.service. May 14 00:47:00.785537 systemd[1]: Reached target network-online.target. May 14 00:47:00.787860 systemd[1]: Starting kubelet.service... May 14 00:47:01.389926 systemd[1]: Started kubelet.service. May 14 00:47:01.391973 systemd[1]: Reached target multi-user.target. May 14 00:47:01.394656 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 14 00:47:01.401221 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 14 00:47:01.401503 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 14 00:47:01.402933 systemd[1]: Startup finished in 614ms (kernel) + 4.687s (initrd) + 5.140s (userspace) = 10.443s. May 14 00:47:01.828334 kubelet[1269]: E0514 00:47:01.828230 1269 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 14 00:47:01.830571 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 14 00:47:01.830688 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 14 00:47:04.695730 systemd[1]: Created slice system-sshd.slice. May 14 00:47:04.696839 systemd[1]: Started sshd@0-10.0.0.97:22-10.0.0.1:55316.service. May 14 00:47:04.752371 sshd[1278]: Accepted publickey for core from 10.0.0.1 port 55316 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:04.754765 sshd[1278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:04.766589 systemd-logind[1200]: New session 1 of user core. May 14 00:47:04.767636 systemd[1]: Created slice user-500.slice. May 14 00:47:04.769852 systemd[1]: Starting user-runtime-dir@500.service... May 14 00:47:04.778590 systemd[1]: Finished user-runtime-dir@500.service. May 14 00:47:04.780084 systemd[1]: Starting user@500.service... May 14 00:47:04.783294 (systemd)[1281]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:04.884424 systemd[1281]: Queued start job for default target default.target. May 14 00:47:04.884967 systemd[1281]: Reached target paths.target. May 14 00:47:04.885002 systemd[1281]: Reached target sockets.target. May 14 00:47:04.885014 systemd[1281]: Reached target timers.target. May 14 00:47:04.885025 systemd[1281]: Reached target basic.target. May 14 00:47:04.885070 systemd[1281]: Reached target default.target. May 14 00:47:04.885094 systemd[1281]: Startup finished in 95ms. May 14 00:47:04.885192 systemd[1]: Started user@500.service. May 14 00:47:04.886133 systemd[1]: Started session-1.scope. May 14 00:47:04.936816 systemd[1]: Started sshd@1-10.0.0.97:22-10.0.0.1:55324.service. May 14 00:47:04.975062 sshd[1290]: Accepted publickey for core from 10.0.0.1 port 55324 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:04.976160 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:04.979677 systemd-logind[1200]: New session 2 of user core. May 14 00:47:04.980811 systemd[1]: Started session-2.scope. May 14 00:47:05.036753 sshd[1290]: pam_unix(sshd:session): session closed for user core May 14 00:47:05.040418 systemd[1]: Started sshd@2-10.0.0.97:22-10.0.0.1:55332.service. May 14 00:47:05.042828 systemd[1]: sshd@1-10.0.0.97:22-10.0.0.1:55324.service: Deactivated successfully. May 14 00:47:05.043437 systemd[1]: session-2.scope: Deactivated successfully. May 14 00:47:05.044003 systemd-logind[1200]: Session 2 logged out. Waiting for processes to exit. May 14 00:47:05.044732 systemd-logind[1200]: Removed session 2. May 14 00:47:05.078135 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 55332 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:05.079239 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:05.083396 systemd-logind[1200]: New session 3 of user core. May 14 00:47:05.083798 systemd[1]: Started session-3.scope. May 14 00:47:05.141993 sshd[1295]: pam_unix(sshd:session): session closed for user core May 14 00:47:05.144667 systemd[1]: sshd@2-10.0.0.97:22-10.0.0.1:55332.service: Deactivated successfully. May 14 00:47:05.145209 systemd[1]: session-3.scope: Deactivated successfully. May 14 00:47:05.145718 systemd-logind[1200]: Session 3 logged out. Waiting for processes to exit. May 14 00:47:05.146705 systemd[1]: Started sshd@3-10.0.0.97:22-10.0.0.1:55338.service. May 14 00:47:05.147231 systemd-logind[1200]: Removed session 3. May 14 00:47:05.184895 sshd[1302]: Accepted publickey for core from 10.0.0.1 port 55338 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:05.186208 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:05.189704 systemd-logind[1200]: New session 4 of user core. May 14 00:47:05.190509 systemd[1]: Started session-4.scope. May 14 00:47:05.249832 sshd[1302]: pam_unix(sshd:session): session closed for user core May 14 00:47:05.252556 systemd[1]: sshd@3-10.0.0.97:22-10.0.0.1:55338.service: Deactivated successfully. May 14 00:47:05.253104 systemd[1]: session-4.scope: Deactivated successfully. May 14 00:47:05.253629 systemd-logind[1200]: Session 4 logged out. Waiting for processes to exit. May 14 00:47:05.254672 systemd[1]: Started sshd@4-10.0.0.97:22-10.0.0.1:55344.service. May 14 00:47:05.255290 systemd-logind[1200]: Removed session 4. May 14 00:47:05.293261 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 55344 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:05.294482 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:05.297751 systemd-logind[1200]: New session 5 of user core. May 14 00:47:05.298686 systemd[1]: Started session-5.scope. May 14 00:47:05.358163 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 14 00:47:05.358385 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:47:05.378218 dbus-daemon[1188]: avc: received setenforce notice (enforcing=1) May 14 00:47:05.380027 sudo[1311]: pam_unix(sudo:session): session closed for user root May 14 00:47:05.385935 sshd[1308]: pam_unix(sshd:session): session closed for user core May 14 00:47:05.390920 systemd[1]: sshd@4-10.0.0.97:22-10.0.0.1:55344.service: Deactivated successfully. May 14 00:47:05.391564 systemd[1]: session-5.scope: Deactivated successfully. May 14 00:47:05.392081 systemd-logind[1200]: Session 5 logged out. Waiting for processes to exit. May 14 00:47:05.393177 systemd[1]: Started sshd@5-10.0.0.97:22-10.0.0.1:55348.service. May 14 00:47:05.393824 systemd-logind[1200]: Removed session 5. May 14 00:47:05.431800 sshd[1315]: Accepted publickey for core from 10.0.0.1 port 55348 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:05.433050 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:05.437441 systemd[1]: Started session-6.scope. May 14 00:47:05.437476 systemd-logind[1200]: New session 6 of user core. May 14 00:47:05.490611 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 14 00:47:05.490831 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:47:05.493514 sudo[1319]: pam_unix(sudo:session): session closed for user root May 14 00:47:05.497731 sudo[1318]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 14 00:47:05.497947 sudo[1318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:47:05.506228 systemd[1]: Stopping audit-rules.service... May 14 00:47:05.506000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 14 00:47:05.507878 auditctl[1322]: No rules May 14 00:47:05.508644 systemd[1]: audit-rules.service: Deactivated successfully. May 14 00:47:05.508801 systemd[1]: Stopped audit-rules.service. May 14 00:47:05.510013 kernel: kauditd_printk_skb: 177 callbacks suppressed May 14 00:47:05.510055 kernel: audit: type=1305 audit(1747183625.506:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 14 00:47:05.510071 kernel: audit: type=1300 audit(1747183625.506:210): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe91bef60 a2=420 a3=0 items=0 ppid=1 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:05.506000 audit[1322]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe91bef60 a2=420 a3=0 items=0 ppid=1 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:05.510301 systemd[1]: Starting audit-rules.service... May 14 00:47:05.506000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 14 00:47:05.515523 kernel: audit: type=1327 audit(1747183625.506:210): proctitle=2F7362696E2F617564697463746C002D44 May 14 00:47:05.515575 kernel: audit: type=1131 audit(1747183625.508:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:05.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:05.527593 augenrules[1339]: No rules May 14 00:47:05.528555 systemd[1]: Finished audit-rules.service. May 14 00:47:05.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:05.529471 sudo[1318]: pam_unix(sudo:session): session closed for user root May 14 00:47:05.530931 sshd[1315]: pam_unix(sshd:session): session closed for user core May 14 00:47:05.529000 audit[1318]: USER_END pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:05.534687 systemd[1]: Started sshd@6-10.0.0.97:22-10.0.0.1:55360.service. May 14 00:47:05.534842 kernel: audit: type=1130 audit(1747183625.528:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:05.534874 kernel: audit: type=1106 audit(1747183625.529:213): pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:05.534890 kernel: audit: type=1104 audit(1747183625.529:214): pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:05.529000 audit[1318]: CRED_DISP pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:05.536758 systemd[1]: sshd@5-10.0.0.97:22-10.0.0.1:55348.service: Deactivated successfully. May 14 00:47:05.537383 systemd[1]: session-6.scope: Deactivated successfully. May 14 00:47:05.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.97:22-10.0.0.1:55360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:05.537980 systemd-logind[1200]: Session 6 logged out. Waiting for processes to exit. May 14 00:47:05.538716 systemd-logind[1200]: Removed session 6. May 14 00:47:05.540737 kernel: audit: type=1130 audit(1747183625.534:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.97:22-10.0.0.1:55360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:05.540795 kernel: audit: type=1106 audit(1747183625.534:216): pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:05.534000 audit[1315]: USER_END pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:05.534000 audit[1315]: CRED_DISP pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:05.547262 kernel: audit: type=1104 audit(1747183625.534:217): pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:05.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.97:22-10.0.0.1:55348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:05.574000 audit[1344]: USER_ACCT pid=1344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:05.575615 sshd[1344]: Accepted publickey for core from 10.0.0.1 port 55360 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:05.575000 audit[1344]: CRED_ACQ pid=1344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:05.575000 audit[1344]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8cc2620 a2=3 a3=1 items=0 ppid=1 pid=1344 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:05.575000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:47:05.577170 sshd[1344]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:05.580731 systemd-logind[1200]: New session 7 of user core. May 14 00:47:05.581511 systemd[1]: Started session-7.scope. May 14 00:47:05.583000 audit[1344]: USER_START pid=1344 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:05.584000 audit[1347]: CRED_ACQ pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:05.631000 audit[1348]: USER_ACCT pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:05.632808 sudo[1348]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 14 00:47:05.631000 audit[1348]: CRED_REFR pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:05.633030 sudo[1348]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:47:05.633000 audit[1348]: USER_START pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:05.697529 systemd[1]: Starting docker.service... May 14 00:47:05.782804 env[1360]: time="2025-05-14T00:47:05.781614751Z" level=info msg="Starting up" May 14 00:47:05.783290 env[1360]: time="2025-05-14T00:47:05.783061824Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 14 00:47:05.783290 env[1360]: time="2025-05-14T00:47:05.783078524Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 14 00:47:05.783290 env[1360]: time="2025-05-14T00:47:05.783098459Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 14 00:47:05.783290 env[1360]: time="2025-05-14T00:47:05.783108528Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 14 00:47:05.785214 env[1360]: time="2025-05-14T00:47:05.785182210Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 14 00:47:05.785214 env[1360]: time="2025-05-14T00:47:05.785203157Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 14 00:47:05.785292 env[1360]: time="2025-05-14T00:47:05.785217835Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 14 00:47:05.785292 env[1360]: time="2025-05-14T00:47:05.785228955Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 14 00:47:05.917514 env[1360]: time="2025-05-14T00:47:05.917471109Z" level=info msg="Loading containers: start." May 14 00:47:05.962000 audit[1394]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:05.962000 audit[1394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffe1e33b50 a2=0 a3=1 items=0 ppid=1360 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:05.962000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 14 00:47:05.964000 audit[1396]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:05.964000 audit[1396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd6c44410 a2=0 a3=1 items=0 ppid=1360 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:05.964000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 14 00:47:05.966000 audit[1398]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:05.966000 audit[1398]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe2f1ea50 a2=0 a3=1 items=0 ppid=1360 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:05.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 14 00:47:05.968000 audit[1400]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:05.968000 audit[1400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc429d8f0 a2=0 a3=1 items=0 ppid=1360 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:05.968000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 14 00:47:05.972000 audit[1402]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:05.972000 audit[1402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe32c9a60 a2=0 a3=1 items=0 ppid=1360 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:05.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 14 00:47:05.998000 audit[1407]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:05.998000 audit[1407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffc4550f0 a2=0 a3=1 items=0 ppid=1360 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:05.998000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 14 00:47:06.005000 audit[1409]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.005000 audit[1409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffddc70180 a2=0 a3=1 items=0 ppid=1360 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.005000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 14 00:47:06.007000 audit[1411]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.007000 audit[1411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffcce6a520 a2=0 a3=1 items=0 ppid=1360 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 14 00:47:06.009000 audit[1413]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.009000 audit[1413]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffffebf0ec0 a2=0 a3=1 items=0 ppid=1360 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 14 00:47:06.016000 audit[1417]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.016000 audit[1417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe8a4d860 a2=0 a3=1 items=0 ppid=1360 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.016000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 14 00:47:06.024000 audit[1418]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.024000 audit[1418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff455d250 a2=0 a3=1 items=0 ppid=1360 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.024000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 14 00:47:06.035443 kernel: Initializing XFRM netlink socket May 14 00:47:06.058846 env[1360]: time="2025-05-14T00:47:06.058798246Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 14 00:47:06.071000 audit[1426]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.071000 audit[1426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffffb193600 a2=0 a3=1 items=0 ppid=1360 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.071000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 14 00:47:06.086000 audit[1429]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.086000 audit[1429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe944b5f0 a2=0 a3=1 items=0 ppid=1360 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.086000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 14 00:47:06.089000 audit[1432]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.089000 audit[1432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff71e39f0 a2=0 a3=1 items=0 ppid=1360 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.089000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 14 00:47:06.090000 audit[1434]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.090000 audit[1434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffef84d140 a2=0 a3=1 items=0 ppid=1360 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.090000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 14 00:47:06.092000 audit[1436]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.092000 audit[1436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffff1783e0 a2=0 a3=1 items=0 ppid=1360 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.092000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 14 00:47:06.094000 audit[1438]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.094000 audit[1438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd1265010 a2=0 a3=1 items=0 ppid=1360 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.094000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 14 00:47:06.096000 audit[1440]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.096000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffdc2d2220 a2=0 a3=1 items=0 ppid=1360 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.096000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 14 00:47:06.102000 audit[1443]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.102000 audit[1443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffc48034a0 a2=0 a3=1 items=0 ppid=1360 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 14 00:47:06.103000 audit[1445]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.103000 audit[1445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffda17b890 a2=0 a3=1 items=0 ppid=1360 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.103000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 14 00:47:06.105000 audit[1447]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.105000 audit[1447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc8a6c7f0 a2=0 a3=1 items=0 ppid=1360 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 14 00:47:06.107000 audit[1449]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.107000 audit[1449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd09e9070 a2=0 a3=1 items=0 ppid=1360 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.107000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 14 00:47:06.109396 systemd-networkd[1050]: docker0: Link UP May 14 00:47:06.115000 audit[1453]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.115000 audit[1453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcad0a3a0 a2=0 a3=1 items=0 ppid=1360 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.115000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 14 00:47:06.126000 audit[1454]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:06.126000 audit[1454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc3526750 a2=0 a3=1 items=0 ppid=1360 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:06.126000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 14 00:47:06.128711 env[1360]: time="2025-05-14T00:47:06.128673090Z" level=info msg="Loading containers: done." May 14 00:47:06.151915 env[1360]: time="2025-05-14T00:47:06.151865418Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 14 00:47:06.152066 env[1360]: time="2025-05-14T00:47:06.152020526Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 14 00:47:06.152125 env[1360]: time="2025-05-14T00:47:06.152103875Z" level=info msg="Daemon has completed initialization" May 14 00:47:06.165358 systemd[1]: Started docker.service. May 14 00:47:06.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:06.172979 env[1360]: time="2025-05-14T00:47:06.172868100Z" level=info msg="API listen on /run/docker.sock" May 14 00:47:06.776743 env[1212]: time="2025-05-14T00:47:06.776688513Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 14 00:47:07.437597 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2205702579.mount: Deactivated successfully. May 14 00:47:09.128409 env[1212]: time="2025-05-14T00:47:09.128350559Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:09.130053 env[1212]: time="2025-05-14T00:47:09.130018570Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab579d62aa850c7d0eca948aad11fcf813743e3b6c9742241c32cb4f1638968b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:09.131833 env[1212]: time="2025-05-14T00:47:09.131796399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:09.133598 env[1212]: time="2025-05-14T00:47:09.133564445Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:09.135161 env[1212]: time="2025-05-14T00:47:09.135122516Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:ab579d62aa850c7d0eca948aad11fcf813743e3b6c9742241c32cb4f1638968b\"" May 14 00:47:09.135731 env[1212]: time="2025-05-14T00:47:09.135707075Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 14 00:47:10.919051 env[1212]: time="2025-05-14T00:47:10.919001667Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:10.920622 env[1212]: time="2025-05-14T00:47:10.920589994Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79534fade29d07745acc698bbf598b0604a9ea1fd7917822c816a74fc0b55965,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:10.922638 env[1212]: time="2025-05-14T00:47:10.922610368Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:10.924175 env[1212]: time="2025-05-14T00:47:10.924145560Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:10.925044 env[1212]: time="2025-05-14T00:47:10.925006435Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:79534fade29d07745acc698bbf598b0604a9ea1fd7917822c816a74fc0b55965\"" May 14 00:47:10.925422 env[1212]: time="2025-05-14T00:47:10.925392466Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 14 00:47:12.059886 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 14 00:47:12.060050 systemd[1]: Stopped kubelet.service. May 14 00:47:12.061445 systemd[1]: Starting kubelet.service... May 14 00:47:12.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:12.064759 kernel: kauditd_printk_skb: 84 callbacks suppressed May 14 00:47:12.064827 kernel: audit: type=1130 audit(1747183632.058:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:12.064851 kernel: audit: type=1131 audit(1747183632.058:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:12.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:12.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:12.160099 systemd[1]: Started kubelet.service. May 14 00:47:12.163424 kernel: audit: type=1130 audit(1747183632.158:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:12.193959 kubelet[1495]: E0514 00:47:12.193907 1495 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 14 00:47:12.196574 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 14 00:47:12.196697 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 14 00:47:12.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:47:12.200432 kernel: audit: type=1131 audit(1747183632.196:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:47:12.419709 env[1212]: time="2025-05-14T00:47:12.419602461Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:12.421707 env[1212]: time="2025-05-14T00:47:12.421653339Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:730fbc2590716b8202fcdd928a813b847575ebf03911a059979257cd6cbb8245,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:12.423261 env[1212]: time="2025-05-14T00:47:12.423214245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:12.425429 env[1212]: time="2025-05-14T00:47:12.425060890Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:12.425903 env[1212]: time="2025-05-14T00:47:12.425876614Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:730fbc2590716b8202fcdd928a813b847575ebf03911a059979257cd6cbb8245\"" May 14 00:47:12.426562 env[1212]: time="2025-05-14T00:47:12.426536954Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 14 00:47:13.603864 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3588600773.mount: Deactivated successfully. May 14 00:47:14.172374 env[1212]: time="2025-05-14T00:47:14.172322564Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:14.173612 env[1212]: time="2025-05-14T00:47:14.173584374Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:14.174847 env[1212]: time="2025-05-14T00:47:14.174816968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:14.175918 env[1212]: time="2025-05-14T00:47:14.175892006Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:14.176477 env[1212]: time="2025-05-14T00:47:14.176449832Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7\"" May 14 00:47:14.177160 env[1212]: time="2025-05-14T00:47:14.177136559Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 14 00:47:14.779635 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3085716354.mount: Deactivated successfully. May 14 00:47:15.953027 env[1212]: time="2025-05-14T00:47:15.952978690Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:15.954797 env[1212]: time="2025-05-14T00:47:15.954767454Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:15.956955 env[1212]: time="2025-05-14T00:47:15.956929729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:15.958649 env[1212]: time="2025-05-14T00:47:15.958624264Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:15.959541 env[1212]: time="2025-05-14T00:47:15.959506832Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4\"" May 14 00:47:15.960182 env[1212]: time="2025-05-14T00:47:15.960161788Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 14 00:47:16.454565 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3808031505.mount: Deactivated successfully. May 14 00:47:16.460730 env[1212]: time="2025-05-14T00:47:16.460678199Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:16.462408 env[1212]: time="2025-05-14T00:47:16.462367755Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:16.464370 env[1212]: time="2025-05-14T00:47:16.464337735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:16.466085 env[1212]: time="2025-05-14T00:47:16.466050911Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:16.466331 env[1212]: time="2025-05-14T00:47:16.466305590Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 14 00:47:16.466937 env[1212]: time="2025-05-14T00:47:16.466910748Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 14 00:47:17.073498 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4234152960.mount: Deactivated successfully. May 14 00:47:20.174509 env[1212]: time="2025-05-14T00:47:20.174458860Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:20.175830 env[1212]: time="2025-05-14T00:47:20.175797429Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:20.177991 env[1212]: time="2025-05-14T00:47:20.177956767Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:20.179846 env[1212]: time="2025-05-14T00:47:20.179814580Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:20.181584 env[1212]: time="2025-05-14T00:47:20.181543765Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82\"" May 14 00:47:22.309855 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 14 00:47:22.310026 systemd[1]: Stopped kubelet.service. May 14 00:47:22.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:22.311425 systemd[1]: Starting kubelet.service... May 14 00:47:22.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:22.315653 kernel: audit: type=1130 audit(1747183642.308:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:22.315739 kernel: audit: type=1131 audit(1747183642.308:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:22.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:22.397841 systemd[1]: Started kubelet.service. May 14 00:47:22.401406 kernel: audit: type=1130 audit(1747183642.396:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:22.431129 kubelet[1528]: E0514 00:47:22.431080 1528 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 14 00:47:22.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:47:22.433444 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 14 00:47:22.433566 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 14 00:47:22.436423 kernel: audit: type=1131 audit(1747183642.432:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:47:25.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:25.402795 systemd[1]: Stopped kubelet.service. May 14 00:47:25.404674 systemd[1]: Starting kubelet.service... May 14 00:47:25.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:25.408356 kernel: audit: type=1130 audit(1747183645.401:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:25.408433 kernel: audit: type=1131 audit(1747183645.401:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:25.431806 systemd[1]: Reloading. May 14 00:47:25.492164 /usr/lib/systemd/system-generators/torcx-generator[1562]: time="2025-05-14T00:47:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:47:25.492199 /usr/lib/systemd/system-generators/torcx-generator[1562]: time="2025-05-14T00:47:25Z" level=info msg="torcx already run" May 14 00:47:25.598564 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:47:25.598583 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:47:25.613572 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:47:25.674128 kernel: audit: type=1400 audit(1747183645.663:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674226 kernel: audit: type=1400 audit(1747183645.663:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674246 kernel: audit: type=1400 audit(1747183645.663:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674264 kernel: audit: type=1400 audit(1747183645.663:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.666000 audit: BPF prog-id=43 op=LOAD May 14 00:47:25.666000 audit: BPF prog-id=36 op=UNLOAD May 14 00:47:25.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.668000 audit: BPF prog-id=44 op=LOAD May 14 00:47:25.668000 audit: BPF prog-id=27 op=UNLOAD May 14 00:47:25.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.670000 audit: BPF prog-id=45 op=LOAD May 14 00:47:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.672000 audit: BPF prog-id=46 op=LOAD May 14 00:47:25.672000 audit: BPF prog-id=28 op=UNLOAD May 14 00:47:25.672000 audit: BPF prog-id=29 op=UNLOAD May 14 00:47:25.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit: BPF prog-id=47 op=LOAD May 14 00:47:25.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.673000 audit: BPF prog-id=48 op=LOAD May 14 00:47:25.673000 audit: BPF prog-id=30 op=UNLOAD May 14 00:47:25.673000 audit: BPF prog-id=31 op=UNLOAD May 14 00:47:25.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit: BPF prog-id=49 op=LOAD May 14 00:47:25.674000 audit: BPF prog-id=32 op=UNLOAD May 14 00:47:25.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.674000 audit: BPF prog-id=50 op=LOAD May 14 00:47:25.674000 audit: BPF prog-id=41 op=UNLOAD May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit: BPF prog-id=51 op=LOAD May 14 00:47:25.675000 audit: BPF prog-id=33 op=UNLOAD May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit: BPF prog-id=52 op=LOAD May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.675000 audit: BPF prog-id=53 op=LOAD May 14 00:47:25.675000 audit: BPF prog-id=34 op=UNLOAD May 14 00:47:25.675000 audit: BPF prog-id=35 op=UNLOAD May 14 00:47:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.676000 audit: BPF prog-id=54 op=LOAD May 14 00:47:25.676000 audit: BPF prog-id=37 op=UNLOAD May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit: BPF prog-id=55 op=LOAD May 14 00:47:25.677000 audit: BPF prog-id=38 op=UNLOAD May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit: BPF prog-id=56 op=LOAD May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:25.677000 audit: BPF prog-id=57 op=LOAD May 14 00:47:25.677000 audit: BPF prog-id=39 op=UNLOAD May 14 00:47:25.677000 audit: BPF prog-id=40 op=UNLOAD May 14 00:47:25.694101 systemd[1]: Started kubelet.service. May 14 00:47:25.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:25.697589 systemd[1]: Stopping kubelet.service... May 14 00:47:25.698094 systemd[1]: kubelet.service: Deactivated successfully. May 14 00:47:25.698265 systemd[1]: Stopped kubelet.service. May 14 00:47:25.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:25.699675 systemd[1]: Starting kubelet.service... May 14 00:47:25.786034 systemd[1]: Started kubelet.service. May 14 00:47:25.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:25.830335 kubelet[1611]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:47:25.830335 kubelet[1611]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 14 00:47:25.830335 kubelet[1611]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:47:25.830675 kubelet[1611]: I0514 00:47:25.830416 1611 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 14 00:47:26.476230 kubelet[1611]: I0514 00:47:26.476173 1611 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 14 00:47:26.476230 kubelet[1611]: I0514 00:47:26.476205 1611 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 14 00:47:26.476498 kubelet[1611]: I0514 00:47:26.476478 1611 server.go:954] "Client rotation is on, will bootstrap in background" May 14 00:47:26.544172 kubelet[1611]: E0514 00:47:26.544122 1611 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.97:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.97:6443: connect: connection refused" logger="UnhandledError" May 14 00:47:26.545459 kubelet[1611]: I0514 00:47:26.545428 1611 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 14 00:47:26.555109 kubelet[1611]: E0514 00:47:26.555062 1611 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 14 00:47:26.555234 kubelet[1611]: I0514 00:47:26.555219 1611 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 14 00:47:26.558222 kubelet[1611]: I0514 00:47:26.558201 1611 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 14 00:47:26.559777 kubelet[1611]: I0514 00:47:26.559728 1611 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 14 00:47:26.560069 kubelet[1611]: I0514 00:47:26.559883 1611 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 14 00:47:26.560272 kubelet[1611]: I0514 00:47:26.560257 1611 topology_manager.go:138] "Creating topology manager with none policy" May 14 00:47:26.560338 kubelet[1611]: I0514 00:47:26.560321 1611 container_manager_linux.go:304] "Creating device plugin manager" May 14 00:47:26.560618 kubelet[1611]: I0514 00:47:26.560600 1611 state_mem.go:36] "Initialized new in-memory state store" May 14 00:47:26.563318 kubelet[1611]: I0514 00:47:26.563294 1611 kubelet.go:446] "Attempting to sync node with API server" May 14 00:47:26.563447 kubelet[1611]: I0514 00:47:26.563432 1611 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 14 00:47:26.563536 kubelet[1611]: I0514 00:47:26.563523 1611 kubelet.go:352] "Adding apiserver pod source" May 14 00:47:26.563597 kubelet[1611]: I0514 00:47:26.563587 1611 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 14 00:47:26.577254 kubelet[1611]: I0514 00:47:26.577219 1611 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 14 00:47:26.577890 kubelet[1611]: W0514 00:47:26.577837 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.97:6443: connect: connection refused May 14 00:47:26.577961 kubelet[1611]: E0514 00:47:26.577900 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.97:6443: connect: connection refused" logger="UnhandledError" May 14 00:47:26.578010 kubelet[1611]: W0514 00:47:26.577982 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.97:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.97:6443: connect: connection refused May 14 00:47:26.578044 kubelet[1611]: E0514 00:47:26.578013 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.97:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.97:6443: connect: connection refused" logger="UnhandledError" May 14 00:47:26.578495 kubelet[1611]: I0514 00:47:26.578476 1611 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 14 00:47:26.578733 kubelet[1611]: W0514 00:47:26.578720 1611 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 14 00:47:26.580198 kubelet[1611]: I0514 00:47:26.580174 1611 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 14 00:47:26.580315 kubelet[1611]: I0514 00:47:26.580303 1611 server.go:1287] "Started kubelet" May 14 00:47:26.583943 kubelet[1611]: I0514 00:47:26.583878 1611 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 14 00:47:26.584295 kubelet[1611]: I0514 00:47:26.584265 1611 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 14 00:47:26.584358 kubelet[1611]: I0514 00:47:26.584336 1611 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 14 00:47:26.583000 audit[1611]: AVC avc: denied { mac_admin } for pid=1611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:26.585285 kubelet[1611]: I0514 00:47:26.585255 1611 server.go:490] "Adding debug handlers to kubelet server" May 14 00:47:26.583000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:47:26.583000 audit[1611]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40004bf0b0 a1=400088f380 a2=40004bf080 a3=25 items=0 ppid=1 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.583000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:47:26.585576 kubelet[1611]: I0514 00:47:26.585554 1611 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 14 00:47:26.584000 audit[1611]: AVC avc: denied { mac_admin } for pid=1611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:26.584000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:47:26.584000 audit[1611]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a311e0 a1=400088f398 a2=40004bf140 a3=25 items=0 ppid=1 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.584000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:47:26.585832 kubelet[1611]: I0514 00:47:26.585817 1611 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 14 00:47:26.585971 kubelet[1611]: I0514 00:47:26.585957 1611 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 14 00:47:26.588000 kubelet[1611]: I0514 00:47:26.587973 1611 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 14 00:47:26.590106 kubelet[1611]: E0514 00:47:26.590059 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:26.590166 kubelet[1611]: I0514 00:47:26.590112 1611 volume_manager.go:297] "Starting Kubelet Volume Manager" May 14 00:47:26.590279 kubelet[1611]: I0514 00:47:26.590262 1611 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 14 00:47:26.590347 kubelet[1611]: I0514 00:47:26.590336 1611 reconciler.go:26] "Reconciler: start to sync state" May 14 00:47:26.589000 audit[1625]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:26.589000 audit[1625]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffb772060 a2=0 a3=1 items=0 ppid=1611 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.590812 kubelet[1611]: W0514 00:47:26.590693 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.97:6443: connect: connection refused May 14 00:47:26.590812 kubelet[1611]: E0514 00:47:26.590732 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.97:6443: connect: connection refused" logger="UnhandledError" May 14 00:47:26.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 14 00:47:26.590967 kubelet[1611]: E0514 00:47:26.590916 1611 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.97:6443: connect: connection refused" interval="200ms" May 14 00:47:26.590000 audit[1626]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:26.590000 audit[1626]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc84dee70 a2=0 a3=1 items=0 ppid=1611 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 14 00:47:26.593000 audit[1628]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:26.593000 audit[1628]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffecc0490 a2=0 a3=1 items=0 ppid=1611 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:47:26.595518 kubelet[1611]: E0514 00:47:26.595493 1611 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 14 00:47:26.597000 audit[1630]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:26.597000 audit[1630]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffebc1210 a2=0 a3=1 items=0 ppid=1611 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:47:26.600742 kubelet[1611]: E0514 00:47:26.595931 1611 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.97:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.97:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183f3e4503c9ec3c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-14 00:47:26.580272188 +0000 UTC m=+0.790452095,LastTimestamp:2025-05-14 00:47:26.580272188 +0000 UTC m=+0.790452095,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 14 00:47:26.600912 kubelet[1611]: I0514 00:47:26.600888 1611 factory.go:221] Registration of the systemd container factory successfully May 14 00:47:26.601098 kubelet[1611]: I0514 00:47:26.601070 1611 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 14 00:47:26.605410 kubelet[1611]: I0514 00:47:26.605378 1611 factory.go:221] Registration of the containerd container factory successfully May 14 00:47:26.612000 audit[1637]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1637 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:26.612000 audit[1637]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff1f0fd70 a2=0 a3=1 items=0 ppid=1611 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 14 00:47:26.614596 kubelet[1611]: I0514 00:47:26.614561 1611 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 14 00:47:26.615455 kubelet[1611]: I0514 00:47:26.615430 1611 cpu_manager.go:221] "Starting CPU manager" policy="none" May 14 00:47:26.615455 kubelet[1611]: I0514 00:47:26.615451 1611 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 14 00:47:26.615554 kubelet[1611]: I0514 00:47:26.615465 1611 state_mem.go:36] "Initialized new in-memory state store" May 14 00:47:26.614000 audit[1639]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:26.614000 audit[1639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffa9d3110 a2=0 a3=1 items=0 ppid=1611 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 14 00:47:26.614000 audit[1640]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:26.614000 audit[1640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6d35a90 a2=0 a3=1 items=0 ppid=1611 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.614000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 14 00:47:26.616733 kubelet[1611]: I0514 00:47:26.616709 1611 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 14 00:47:26.616785 kubelet[1611]: I0514 00:47:26.616741 1611 status_manager.go:227] "Starting to sync pod status with apiserver" May 14 00:47:26.616785 kubelet[1611]: I0514 00:47:26.616761 1611 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 14 00:47:26.616785 kubelet[1611]: I0514 00:47:26.616768 1611 kubelet.go:2388] "Starting kubelet main sync loop" May 14 00:47:26.616851 kubelet[1611]: E0514 00:47:26.616808 1611 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 14 00:47:26.617215 kubelet[1611]: W0514 00:47:26.617194 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.97:6443: connect: connection refused May 14 00:47:26.617251 kubelet[1611]: E0514 00:47:26.617229 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.97:6443: connect: connection refused" logger="UnhandledError" May 14 00:47:26.616000 audit[1642]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:26.616000 audit[1642]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc8904170 a2=0 a3=1 items=0 ppid=1611 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.616000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 14 00:47:26.616000 audit[1641]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:26.616000 audit[1641]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9a138a0 a2=0 a3=1 items=0 ppid=1611 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 14 00:47:26.617000 audit[1643]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:26.617000 audit[1643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff383a1a0 a2=0 a3=1 items=0 ppid=1611 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 14 00:47:26.617000 audit[1644]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:26.617000 audit[1644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe74d8c20 a2=0 a3=1 items=0 ppid=1611 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 14 00:47:26.618000 audit[1645]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:26.618000 audit[1645]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffa91eea0 a2=0 a3=1 items=0 ppid=1611 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.618000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 14 00:47:26.683021 kubelet[1611]: I0514 00:47:26.682970 1611 policy_none.go:49] "None policy: Start" May 14 00:47:26.683021 kubelet[1611]: I0514 00:47:26.683013 1611 memory_manager.go:186] "Starting memorymanager" policy="None" May 14 00:47:26.683169 kubelet[1611]: I0514 00:47:26.683041 1611 state_mem.go:35] "Initializing new in-memory state store" May 14 00:47:26.687702 systemd[1]: Created slice kubepods.slice. May 14 00:47:26.690228 kubelet[1611]: E0514 00:47:26.690211 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:26.691525 systemd[1]: Created slice kubepods-besteffort.slice. May 14 00:47:26.699407 systemd[1]: Created slice kubepods-burstable.slice. May 14 00:47:26.700639 kubelet[1611]: I0514 00:47:26.700618 1611 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 14 00:47:26.699000 audit[1611]: AVC avc: denied { mac_admin } for pid=1611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:26.699000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:47:26.699000 audit[1611]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f0dbc0 a1=4000f304c8 a2=4000f0db90 a3=25 items=0 ppid=1 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:26.699000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:47:26.701005 kubelet[1611]: I0514 00:47:26.700983 1611 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 14 00:47:26.701219 kubelet[1611]: I0514 00:47:26.701200 1611 eviction_manager.go:189] "Eviction manager: starting control loop" May 14 00:47:26.701318 kubelet[1611]: I0514 00:47:26.701284 1611 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 14 00:47:26.701682 kubelet[1611]: I0514 00:47:26.701663 1611 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 14 00:47:26.703085 kubelet[1611]: E0514 00:47:26.703069 1611 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 14 00:47:26.703213 kubelet[1611]: E0514 00:47:26.703199 1611 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 14 00:47:26.725371 systemd[1]: Created slice kubepods-burstable-pod3aeed40be0d849a52f0486c6d2094fb0.slice. May 14 00:47:26.734253 kubelet[1611]: E0514 00:47:26.734148 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 14 00:47:26.735722 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 14 00:47:26.751442 kubelet[1611]: E0514 00:47:26.751411 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 14 00:47:26.753843 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 14 00:47:26.755354 kubelet[1611]: E0514 00:47:26.755331 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 14 00:47:26.791693 kubelet[1611]: E0514 00:47:26.791657 1611 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.97:6443: connect: connection refused" interval="400ms" May 14 00:47:26.802736 kubelet[1611]: I0514 00:47:26.802707 1611 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 14 00:47:26.805092 kubelet[1611]: E0514 00:47:26.805057 1611 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.97:6443/api/v1/nodes\": dial tcp 10.0.0.97:6443: connect: connection refused" node="localhost" May 14 00:47:26.892513 kubelet[1611]: I0514 00:47:26.892471 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 14 00:47:26.892961 kubelet[1611]: I0514 00:47:26.892936 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3aeed40be0d849a52f0486c6d2094fb0-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"3aeed40be0d849a52f0486c6d2094fb0\") " pod="kube-system/kube-apiserver-localhost" May 14 00:47:26.893060 kubelet[1611]: I0514 00:47:26.893045 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3aeed40be0d849a52f0486c6d2094fb0-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"3aeed40be0d849a52f0486c6d2094fb0\") " pod="kube-system/kube-apiserver-localhost" May 14 00:47:26.893146 kubelet[1611]: I0514 00:47:26.893130 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3aeed40be0d849a52f0486c6d2094fb0-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"3aeed40be0d849a52f0486c6d2094fb0\") " pod="kube-system/kube-apiserver-localhost" May 14 00:47:26.893234 kubelet[1611]: I0514 00:47:26.893221 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:47:26.893341 kubelet[1611]: I0514 00:47:26.893327 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:47:26.893446 kubelet[1611]: I0514 00:47:26.893432 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:47:26.893529 kubelet[1611]: I0514 00:47:26.893517 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:47:26.893637 kubelet[1611]: I0514 00:47:26.893607 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:47:27.006879 kubelet[1611]: I0514 00:47:27.006796 1611 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 14 00:47:27.007561 kubelet[1611]: E0514 00:47:27.007524 1611 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.97:6443/api/v1/nodes\": dial tcp 10.0.0.97:6443: connect: connection refused" node="localhost" May 14 00:47:27.035604 kubelet[1611]: E0514 00:47:27.035575 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:27.036291 env[1212]: time="2025-05-14T00:47:27.036207123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:3aeed40be0d849a52f0486c6d2094fb0,Namespace:kube-system,Attempt:0,}" May 14 00:47:27.053106 kubelet[1611]: E0514 00:47:27.053077 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:27.053765 env[1212]: time="2025-05-14T00:47:27.053720052Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 14 00:47:27.056014 kubelet[1611]: E0514 00:47:27.055993 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:27.056479 env[1212]: time="2025-05-14T00:47:27.056447109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 14 00:47:27.192040 kubelet[1611]: E0514 00:47:27.191982 1611 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.97:6443: connect: connection refused" interval="800ms" May 14 00:47:27.409272 kubelet[1611]: I0514 00:47:27.409230 1611 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 14 00:47:27.409581 kubelet[1611]: E0514 00:47:27.409553 1611 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.97:6443/api/v1/nodes\": dial tcp 10.0.0.97:6443: connect: connection refused" node="localhost" May 14 00:47:27.545356 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount588785641.mount: Deactivated successfully. May 14 00:47:27.549568 env[1212]: time="2025-05-14T00:47:27.549529446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.552235 env[1212]: time="2025-05-14T00:47:27.552205994Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.553982 env[1212]: time="2025-05-14T00:47:27.553953124Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.555027 env[1212]: time="2025-05-14T00:47:27.554999609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.555869 env[1212]: time="2025-05-14T00:47:27.555845579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.558427 env[1212]: time="2025-05-14T00:47:27.558381165Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.559462 env[1212]: time="2025-05-14T00:47:27.559433134Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.562092 env[1212]: time="2025-05-14T00:47:27.562067017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.564656 env[1212]: time="2025-05-14T00:47:27.564629699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.565565 env[1212]: time="2025-05-14T00:47:27.565538264Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.566218 env[1212]: time="2025-05-14T00:47:27.566197246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.567003 env[1212]: time="2025-05-14T00:47:27.566977177Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:27.600768 env[1212]: time="2025-05-14T00:47:27.600686152Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:47:27.600768 env[1212]: time="2025-05-14T00:47:27.600736101Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:47:27.600953 env[1212]: time="2025-05-14T00:47:27.600746547Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:47:27.601259 env[1212]: time="2025-05-14T00:47:27.601224784Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf270f44cdcdc81b026e30529aa921c1b981be37bb13cfa9daeee930d49e77bf pid=1669 runtime=io.containerd.runc.v2 May 14 00:47:27.602013 env[1212]: time="2025-05-14T00:47:27.601955727Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:47:27.602013 env[1212]: time="2025-05-14T00:47:27.601993268Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:47:27.602013 env[1212]: time="2025-05-14T00:47:27.602003714Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:47:27.602269 env[1212]: time="2025-05-14T00:47:27.602203470Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2f32fcfe41a755e11c6d30be1adb0c3f214255932b986654d49c7064c4ba26f pid=1671 runtime=io.containerd.runc.v2 May 14 00:47:27.602363 env[1212]: time="2025-05-14T00:47:27.602310172Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:47:27.602363 env[1212]: time="2025-05-14T00:47:27.602343151Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:47:27.602363 env[1212]: time="2025-05-14T00:47:27.602353117Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:47:27.602511 env[1212]: time="2025-05-14T00:47:27.602470464Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc820fdb661c4bd576021deb90368b115638b4c5d65560eaf487c2e2e426d7d9 pid=1672 runtime=io.containerd.runc.v2 May 14 00:47:27.613930 systemd[1]: Started cri-containerd-bc820fdb661c4bd576021deb90368b115638b4c5d65560eaf487c2e2e426d7d9.scope. May 14 00:47:27.616080 systemd[1]: Started cri-containerd-a2f32fcfe41a755e11c6d30be1adb0c3f214255932b986654d49c7064c4ba26f.scope. May 14 00:47:27.627717 systemd[1]: Started cri-containerd-bf270f44cdcdc81b026e30529aa921c1b981be37bb13cfa9daeee930d49e77bf.scope. May 14 00:47:27.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.652840 kernel: kauditd_printk_skb: 219 callbacks suppressed May 14 00:47:27.652936 kernel: audit: type=1400 audit(1747183647.649:452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.652969 kernel: audit: type=1400 audit(1747183647.649:453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.657489 kernel: audit: type=1400 audit(1747183647.649:454): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.657547 kernel: audit: type=1400 audit(1747183647.649:455): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.662571 kernel: audit: type=1400 audit(1747183647.649:456): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.662623 kernel: audit: type=1400 audit(1747183647.649:457): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.663475 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 14 00:47:27.663530 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 14 00:47:27.663556 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 14 00:47:27.663578 kernel: audit: backlog limit exceeded May 14 00:47:27.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.650000 audit: BPF prog-id=58 op=LOAD May 14 00:47:27.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit: BPF prog-id=59 op=LOAD May 14 00:47:27.659000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1672 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263383230666462363631633462643537363032316465623930333638 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1672 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263383230666462363631633462643537363032316465623930333638 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit: BPF prog-id=60 op=LOAD May 14 00:47:27.659000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1672 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263383230666462363631633462643537363032316465623930333638 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1671 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663332666366653431613735356531316336643330626531616462 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1671 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663332666366653431613735356531316336643330626531616462 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.659000 audit: BPF prog-id=61 op=LOAD May 14 00:47:27.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.664000 audit: BPF prog-id=63 op=LOAD May 14 00:47:27.659000 audit[1699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1671 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663332666366653431613735356531316336643330626531616462 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit: BPF prog-id=64 op=LOAD May 14 00:47:27.665000 audit[1699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1671 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663332666366653431613735356531316336643330626531616462 May 14 00:47:27.665000 audit: BPF prog-id=64 op=UNLOAD May 14 00:47:27.665000 audit: BPF prog-id=61 op=UNLOAD May 14 00:47:27.665000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.665000 audit: BPF prog-id=65 op=LOAD May 14 00:47:27.665000 audit[1699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1671 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663332666366653431613735356531316336643330626531616462 May 14 00:47:27.659000 audit: BPF prog-id=62 op=LOAD May 14 00:47:27.659000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1672 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263383230666462363631633462643537363032316465623930333638 May 14 00:47:27.667000 audit: BPF prog-id=62 op=UNLOAD May 14 00:47:27.667000 audit: BPF prog-id=60 op=UNLOAD May 14 00:47:27.667000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit: BPF prog-id=66 op=LOAD May 14 00:47:27.667000 audit[1712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=1669 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.667000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1672 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263383230666462363631633462643537363032316465623930333638 May 14 00:47:27.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323730663434636463646338316230323665333035323961613932 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=1669 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323730663434636463646338316230323665333035323961613932 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit: BPF prog-id=67 op=LOAD May 14 00:47:27.667000 audit[1712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=1669 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323730663434636463646338316230323665333035323961613932 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.667000 audit: BPF prog-id=68 op=LOAD May 14 00:47:27.667000 audit[1712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=1669 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323730663434636463646338316230323665333035323961613932 May 14 00:47:27.668000 audit: BPF prog-id=68 op=UNLOAD May 14 00:47:27.668000 audit: BPF prog-id=67 op=UNLOAD May 14 00:47:27.668000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.668000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.668000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.668000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.668000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.668000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.668000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.668000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.668000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.668000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.668000 audit: BPF prog-id=69 op=LOAD May 14 00:47:27.668000 audit[1712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=1669 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323730663434636463646338316230323665333035323961613932 May 14 00:47:27.688195 env[1212]: time="2025-05-14T00:47:27.688159183Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:3aeed40be0d849a52f0486c6d2094fb0,Namespace:kube-system,Attempt:0,} returns sandbox id \"bc820fdb661c4bd576021deb90368b115638b4c5d65560eaf487c2e2e426d7d9\"" May 14 00:47:27.689340 kubelet[1611]: E0514 00:47:27.689136 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:27.697964 env[1212]: time="2025-05-14T00:47:27.697909822Z" level=info msg="CreateContainer within sandbox \"bc820fdb661c4bd576021deb90368b115638b4c5d65560eaf487c2e2e426d7d9\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 14 00:47:27.698191 env[1212]: time="2025-05-14T00:47:27.698163449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"bf270f44cdcdc81b026e30529aa921c1b981be37bb13cfa9daeee930d49e77bf\"" May 14 00:47:27.698406 kubelet[1611]: W0514 00:47:27.698353 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.97:6443: connect: connection refused May 14 00:47:27.698475 kubelet[1611]: E0514 00:47:27.698445 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.97:6443: connect: connection refused" logger="UnhandledError" May 14 00:47:27.699743 env[1212]: time="2025-05-14T00:47:27.698618272Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"a2f32fcfe41a755e11c6d30be1adb0c3f214255932b986654d49c7064c4ba26f\"" May 14 00:47:27.700076 kubelet[1611]: E0514 00:47:27.700054 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:27.700145 kubelet[1611]: E0514 00:47:27.700082 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:27.702146 env[1212]: time="2025-05-14T00:47:27.702121058Z" level=info msg="CreateContainer within sandbox \"bf270f44cdcdc81b026e30529aa921c1b981be37bb13cfa9daeee930d49e77bf\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 14 00:47:27.703035 env[1212]: time="2025-05-14T00:47:27.703005129Z" level=info msg="CreateContainer within sandbox \"a2f32fcfe41a755e11c6d30be1adb0c3f214255932b986654d49c7064c4ba26f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 14 00:47:27.716136 env[1212]: time="2025-05-14T00:47:27.716091538Z" level=info msg="CreateContainer within sandbox \"bc820fdb661c4bd576021deb90368b115638b4c5d65560eaf487c2e2e426d7d9\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"40e39468868539617094cc745d29eaa5c0f6662cf340a4547a5013345f6915a7\"" May 14 00:47:27.716708 env[1212]: time="2025-05-14T00:47:27.716679398Z" level=info msg="StartContainer for \"40e39468868539617094cc745d29eaa5c0f6662cf340a4547a5013345f6915a7\"" May 14 00:47:27.720303 env[1212]: time="2025-05-14T00:47:27.720263030Z" level=info msg="CreateContainer within sandbox \"a2f32fcfe41a755e11c6d30be1adb0c3f214255932b986654d49c7064c4ba26f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"6266461660536f565178ba65bb7341de76948a56fe4cc6b90bea0a98f3d70e2b\"" May 14 00:47:27.720846 env[1212]: time="2025-05-14T00:47:27.720817191Z" level=info msg="StartContainer for \"6266461660536f565178ba65bb7341de76948a56fe4cc6b90bea0a98f3d70e2b\"" May 14 00:47:27.720955 env[1212]: time="2025-05-14T00:47:27.720919170Z" level=info msg="CreateContainer within sandbox \"bf270f44cdcdc81b026e30529aa921c1b981be37bb13cfa9daeee930d49e77bf\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"0a3a6b493ab9c34202b72b02c54eb5063150d2e9558e9efdab1ba9503dd40e8b\"" May 14 00:47:27.721385 env[1212]: time="2025-05-14T00:47:27.721356022Z" level=info msg="StartContainer for \"0a3a6b493ab9c34202b72b02c54eb5063150d2e9558e9efdab1ba9503dd40e8b\"" May 14 00:47:27.734282 systemd[1]: Started cri-containerd-40e39468868539617094cc745d29eaa5c0f6662cf340a4547a5013345f6915a7.scope. May 14 00:47:27.751968 systemd[1]: Started cri-containerd-0a3a6b493ab9c34202b72b02c54eb5063150d2e9558e9efdab1ba9503dd40e8b.scope. May 14 00:47:27.752710 systemd[1]: Started cri-containerd-6266461660536f565178ba65bb7341de76948a56fe4cc6b90bea0a98f3d70e2b.scope. May 14 00:47:27.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit: BPF prog-id=70 op=LOAD May 14 00:47:27.780000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1669 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061336136623439336162396333343230326237326230326335346562 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1669 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061336136623439336162396333343230326237326230326335346562 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit: BPF prog-id=71 op=LOAD May 14 00:47:27.780000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1669 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061336136623439336162396333343230326237326230326335346562 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.780000 audit: BPF prog-id=72 op=LOAD May 14 00:47:27.780000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1669 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061336136623439336162396333343230326237326230326335346562 May 14 00:47:27.781000 audit: BPF prog-id=72 op=UNLOAD May 14 00:47:27.781000 audit: BPF prog-id=71 op=UNLOAD May 14 00:47:27.781000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.781000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.781000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.781000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.781000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.781000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.781000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.781000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.781000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.781000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.781000 audit: BPF prog-id=73 op=LOAD May 14 00:47:27.781000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1669 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061336136623439336162396333343230326237326230326335346562 May 14 00:47:27.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.782000 audit: BPF prog-id=74 op=LOAD May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1672 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653339343638383638353339363137303934636337343564323965 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1672 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653339343638383638353339363137303934636337343564323965 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit: BPF prog-id=75 op=LOAD May 14 00:47:27.783000 audit[1787]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1672 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653339343638383638353339363137303934636337343564323965 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit: BPF prog-id=76 op=LOAD May 14 00:47:27.783000 audit[1787]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1672 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653339343638383638353339363137303934636337343564323965 May 14 00:47:27.783000 audit: BPF prog-id=76 op=UNLOAD May 14 00:47:27.783000 audit: BPF prog-id=75 op=UNLOAD May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit: BPF prog-id=77 op=LOAD May 14 00:47:27.783000 audit[1787]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1672 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653339343638383638353339363137303934636337343564323965 May 14 00:47:27.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.783000 audit: BPF prog-id=78 op=LOAD May 14 00:47:27.784000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.784000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1671 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632363634363136363035333666353635313738626136356262373334 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1671 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632363634363136363035333666353635313738626136356262373334 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit: BPF prog-id=79 op=LOAD May 14 00:47:27.785000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1671 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632363634363136363035333666353635313738626136356262373334 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.785000 audit: BPF prog-id=80 op=LOAD May 14 00:47:27.785000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1671 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632363634363136363035333666353635313738626136356262373334 May 14 00:47:27.786000 audit: BPF prog-id=80 op=UNLOAD May 14 00:47:27.786000 audit: BPF prog-id=79 op=UNLOAD May 14 00:47:27.786000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.786000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.786000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.786000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.786000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.786000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.786000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.786000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.786000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.786000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:27.786000 audit: BPF prog-id=81 op=LOAD May 14 00:47:27.786000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1671 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:27.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632363634363136363035333666353635313738626136356262373334 May 14 00:47:27.811309 env[1212]: time="2025-05-14T00:47:27.810556612Z" level=info msg="StartContainer for \"40e39468868539617094cc745d29eaa5c0f6662cf340a4547a5013345f6915a7\" returns successfully" May 14 00:47:27.811953 env[1212]: time="2025-05-14T00:47:27.811917279Z" level=info msg="StartContainer for \"0a3a6b493ab9c34202b72b02c54eb5063150d2e9558e9efdab1ba9503dd40e8b\" returns successfully" May 14 00:47:27.847136 env[1212]: time="2025-05-14T00:47:27.847091782Z" level=info msg="StartContainer for \"6266461660536f565178ba65bb7341de76948a56fe4cc6b90bea0a98f3d70e2b\" returns successfully" May 14 00:47:27.973592 kubelet[1611]: W0514 00:47:27.973467 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.97:6443: connect: connection refused May 14 00:47:27.973592 kubelet[1611]: E0514 00:47:27.973537 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.97:6443: connect: connection refused" logger="UnhandledError" May 14 00:47:28.211356 kubelet[1611]: I0514 00:47:28.211326 1611 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 14 00:47:28.626413 kubelet[1611]: E0514 00:47:28.626371 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 14 00:47:28.626562 kubelet[1611]: E0514 00:47:28.626502 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:28.630063 kubelet[1611]: E0514 00:47:28.630034 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 14 00:47:28.630205 kubelet[1611]: E0514 00:47:28.630167 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:28.633052 kubelet[1611]: E0514 00:47:28.633028 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 14 00:47:28.633138 kubelet[1611]: E0514 00:47:28.633124 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:29.155000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:29.155000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=4004666c30 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:47:29.155000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:47:29.162000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:29.162000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=40045ce6e0 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:47:29.162000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:47:29.162000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:29.162000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:29.162000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=40042f4c30 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:47:29.162000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:47:29.162000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=40062d4000 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:47:29.162000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:47:29.170000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:29.170000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=4006a76000 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:47:29.170000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:47:29.170000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:29.170000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400810d320 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:47:29.170000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:47:29.215176 kubelet[1611]: E0514 00:47:29.215137 1611 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 14 00:47:29.299435 kubelet[1611]: I0514 00:47:29.299381 1611 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 14 00:47:29.299435 kubelet[1611]: E0514 00:47:29.299436 1611 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 14 00:47:29.302632 kubelet[1611]: E0514 00:47:29.302598 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:29.402908 kubelet[1611]: E0514 00:47:29.402861 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:29.503516 kubelet[1611]: E0514 00:47:29.503415 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:29.601000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:29.601000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40003da3a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:47:29.601000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:47:29.601000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:29.601000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000490fc0 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:47:29.601000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:47:29.603899 kubelet[1611]: E0514 00:47:29.603855 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:29.634983 kubelet[1611]: E0514 00:47:29.634414 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 14 00:47:29.634983 kubelet[1611]: E0514 00:47:29.634450 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 14 00:47:29.634983 kubelet[1611]: E0514 00:47:29.634560 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:29.634983 kubelet[1611]: E0514 00:47:29.634603 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:29.704416 kubelet[1611]: E0514 00:47:29.704375 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:29.805014 kubelet[1611]: E0514 00:47:29.804903 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:29.905472 kubelet[1611]: E0514 00:47:29.905439 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:30.005985 kubelet[1611]: E0514 00:47:30.005957 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:30.101264 kubelet[1611]: E0514 00:47:30.101231 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 14 00:47:30.101373 kubelet[1611]: E0514 00:47:30.101352 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:30.106668 kubelet[1611]: E0514 00:47:30.106643 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:30.207282 kubelet[1611]: E0514 00:47:30.207248 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:30.291224 kubelet[1611]: I0514 00:47:30.291175 1611 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 14 00:47:30.306408 kubelet[1611]: I0514 00:47:30.306372 1611 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 14 00:47:30.310084 kubelet[1611]: I0514 00:47:30.310058 1611 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 14 00:47:30.566480 kubelet[1611]: I0514 00:47:30.566196 1611 apiserver.go:52] "Watching apiserver" May 14 00:47:30.590936 kubelet[1611]: I0514 00:47:30.590901 1611 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 14 00:47:30.634908 kubelet[1611]: E0514 00:47:30.634884 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:30.635009 kubelet[1611]: E0514 00:47:30.634936 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:30.635009 kubelet[1611]: I0514 00:47:30.634957 1611 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 14 00:47:30.639575 kubelet[1611]: E0514 00:47:30.639549 1611 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 14 00:47:30.639686 kubelet[1611]: E0514 00:47:30.639671 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:31.253602 systemd[1]: Reloading. May 14 00:47:31.303103 /usr/lib/systemd/system-generators/torcx-generator[1911]: time="2025-05-14T00:47:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:47:31.303508 /usr/lib/systemd/system-generators/torcx-generator[1911]: time="2025-05-14T00:47:31Z" level=info msg="torcx already run" May 14 00:47:31.358858 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:47:31.358880 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:47:31.374589 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:47:31.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.433000 audit: BPF prog-id=82 op=LOAD May 14 00:47:31.433000 audit: BPF prog-id=43 op=UNLOAD May 14 00:47:31.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit: BPF prog-id=83 op=LOAD May 14 00:47:31.435000 audit: BPF prog-id=44 op=UNLOAD May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit: BPF prog-id=84 op=LOAD May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit: BPF prog-id=85 op=LOAD May 14 00:47:31.435000 audit: BPF prog-id=45 op=UNLOAD May 14 00:47:31.435000 audit: BPF prog-id=46 op=UNLOAD May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.435000 audit: BPF prog-id=86 op=LOAD May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit: BPF prog-id=87 op=LOAD May 14 00:47:31.436000 audit: BPF prog-id=47 op=UNLOAD May 14 00:47:31.436000 audit: BPF prog-id=48 op=UNLOAD May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit: BPF prog-id=88 op=LOAD May 14 00:47:31.436000 audit: BPF prog-id=59 op=UNLOAD May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.436000 audit: BPF prog-id=89 op=LOAD May 14 00:47:31.436000 audit: BPF prog-id=63 op=UNLOAD May 14 00:47:31.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.437000 audit: BPF prog-id=90 op=LOAD May 14 00:47:31.437000 audit: BPF prog-id=49 op=UNLOAD May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit: BPF prog-id=91 op=LOAD May 14 00:47:31.438000 audit: BPF prog-id=50 op=UNLOAD May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit: BPF prog-id=92 op=LOAD May 14 00:47:31.438000 audit: BPF prog-id=74 op=UNLOAD May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.438000 audit: BPF prog-id=93 op=LOAD May 14 00:47:31.438000 audit: BPF prog-id=78 op=UNLOAD May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit: BPF prog-id=94 op=LOAD May 14 00:47:31.439000 audit: BPF prog-id=51 op=UNLOAD May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit: BPF prog-id=95 op=LOAD May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.439000 audit: BPF prog-id=96 op=LOAD May 14 00:47:31.439000 audit: BPF prog-id=52 op=UNLOAD May 14 00:47:31.439000 audit: BPF prog-id=53 op=UNLOAD May 14 00:47:31.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.440000 audit: BPF prog-id=97 op=LOAD May 14 00:47:31.440000 audit: BPF prog-id=58 op=UNLOAD May 14 00:47:31.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.441000 audit: BPF prog-id=98 op=LOAD May 14 00:47:31.441000 audit: BPF prog-id=54 op=UNLOAD May 14 00:47:31.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit: BPF prog-id=99 op=LOAD May 14 00:47:31.442000 audit: BPF prog-id=70 op=UNLOAD May 14 00:47:31.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.442000 audit: BPF prog-id=100 op=LOAD May 14 00:47:31.443000 audit: BPF prog-id=55 op=UNLOAD May 14 00:47:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit: BPF prog-id=101 op=LOAD May 14 00:47:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.443000 audit: BPF prog-id=102 op=LOAD May 14 00:47:31.443000 audit: BPF prog-id=56 op=UNLOAD May 14 00:47:31.443000 audit: BPF prog-id=57 op=UNLOAD May 14 00:47:31.453775 systemd[1]: Stopping kubelet.service... May 14 00:47:31.482758 systemd[1]: kubelet.service: Deactivated successfully. May 14 00:47:31.482946 systemd[1]: Stopped kubelet.service. May 14 00:47:31.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:31.483001 systemd[1]: kubelet.service: Consumed 1.196s CPU time. May 14 00:47:31.484753 systemd[1]: Starting kubelet.service... May 14 00:47:31.577332 systemd[1]: Started kubelet.service. May 14 00:47:31.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:31.613653 kubelet[1952]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:47:31.613653 kubelet[1952]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 14 00:47:31.613653 kubelet[1952]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:47:31.613970 kubelet[1952]: I0514 00:47:31.613737 1952 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 14 00:47:31.620329 kubelet[1952]: I0514 00:47:31.620289 1952 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 14 00:47:31.620329 kubelet[1952]: I0514 00:47:31.620322 1952 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 14 00:47:31.620598 kubelet[1952]: I0514 00:47:31.620572 1952 server.go:954] "Client rotation is on, will bootstrap in background" May 14 00:47:31.621792 kubelet[1952]: I0514 00:47:31.621770 1952 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 14 00:47:31.623960 kubelet[1952]: I0514 00:47:31.623933 1952 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 14 00:47:31.627109 kubelet[1952]: E0514 00:47:31.627083 1952 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 14 00:47:31.627177 kubelet[1952]: I0514 00:47:31.627122 1952 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 14 00:47:31.631897 kubelet[1952]: I0514 00:47:31.631861 1952 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 14 00:47:31.632107 kubelet[1952]: I0514 00:47:31.632072 1952 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 14 00:47:31.632245 kubelet[1952]: I0514 00:47:31.632098 1952 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 14 00:47:31.632320 kubelet[1952]: I0514 00:47:31.632256 1952 topology_manager.go:138] "Creating topology manager with none policy" May 14 00:47:31.632320 kubelet[1952]: I0514 00:47:31.632265 1952 container_manager_linux.go:304] "Creating device plugin manager" May 14 00:47:31.632320 kubelet[1952]: I0514 00:47:31.632307 1952 state_mem.go:36] "Initialized new in-memory state store" May 14 00:47:31.632454 kubelet[1952]: I0514 00:47:31.632443 1952 kubelet.go:446] "Attempting to sync node with API server" May 14 00:47:31.632495 kubelet[1952]: I0514 00:47:31.632458 1952 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 14 00:47:31.632495 kubelet[1952]: I0514 00:47:31.632489 1952 kubelet.go:352] "Adding apiserver pod source" May 14 00:47:31.632495 kubelet[1952]: I0514 00:47:31.632499 1952 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 14 00:47:31.633115 kubelet[1952]: I0514 00:47:31.633083 1952 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 14 00:47:31.633575 kubelet[1952]: I0514 00:47:31.633552 1952 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 14 00:47:31.634122 kubelet[1952]: I0514 00:47:31.634090 1952 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 14 00:47:31.634122 kubelet[1952]: I0514 00:47:31.634120 1952 server.go:1287] "Started kubelet" May 14 00:47:31.635518 kubelet[1952]: I0514 00:47:31.635469 1952 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 14 00:47:31.635839 kubelet[1952]: I0514 00:47:31.635820 1952 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 14 00:47:31.635965 kubelet[1952]: I0514 00:47:31.635945 1952 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 14 00:47:31.636000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.636000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:47:31.636000 audit[1952]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000972d50 a1=40002497d0 a2=4000972d20 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:31.636000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:47:31.636000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.636000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:47:31.636000 audit[1952]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000790e60 a1=40002497e8 a2=4000972de0 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:31.636000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:47:31.637057 kubelet[1952]: I0514 00:47:31.636693 1952 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 14 00:47:31.637057 kubelet[1952]: I0514 00:47:31.636742 1952 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 14 00:47:31.637057 kubelet[1952]: I0514 00:47:31.636774 1952 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 14 00:47:31.637428 kubelet[1952]: I0514 00:47:31.637378 1952 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 14 00:47:31.637677 kubelet[1952]: I0514 00:47:31.637654 1952 server.go:490] "Adding debug handlers to kubelet server" May 14 00:47:31.643366 kubelet[1952]: E0514 00:47:31.642285 1952 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:47:31.643366 kubelet[1952]: I0514 00:47:31.642336 1952 volume_manager.go:297] "Starting Kubelet Volume Manager" May 14 00:47:31.643366 kubelet[1952]: I0514 00:47:31.642515 1952 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 14 00:47:31.643366 kubelet[1952]: I0514 00:47:31.642658 1952 reconciler.go:26] "Reconciler: start to sync state" May 14 00:47:31.644497 kubelet[1952]: I0514 00:47:31.644473 1952 factory.go:221] Registration of the systemd container factory successfully May 14 00:47:31.644699 kubelet[1952]: I0514 00:47:31.644678 1952 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 14 00:47:31.654465 kubelet[1952]: E0514 00:47:31.653673 1952 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 14 00:47:31.655640 kubelet[1952]: I0514 00:47:31.655613 1952 factory.go:221] Registration of the containerd container factory successfully May 14 00:47:31.674878 kubelet[1952]: I0514 00:47:31.674842 1952 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 14 00:47:31.675820 kubelet[1952]: I0514 00:47:31.675799 1952 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 14 00:47:31.675929 kubelet[1952]: I0514 00:47:31.675916 1952 status_manager.go:227] "Starting to sync pod status with apiserver" May 14 00:47:31.675997 kubelet[1952]: I0514 00:47:31.675986 1952 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 14 00:47:31.676051 kubelet[1952]: I0514 00:47:31.676042 1952 kubelet.go:2388] "Starting kubelet main sync loop" May 14 00:47:31.676149 kubelet[1952]: E0514 00:47:31.676132 1952 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 14 00:47:31.694656 kubelet[1952]: I0514 00:47:31.694620 1952 cpu_manager.go:221] "Starting CPU manager" policy="none" May 14 00:47:31.694656 kubelet[1952]: I0514 00:47:31.694641 1952 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 14 00:47:31.694656 kubelet[1952]: I0514 00:47:31.694663 1952 state_mem.go:36] "Initialized new in-memory state store" May 14 00:47:31.694828 kubelet[1952]: I0514 00:47:31.694803 1952 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 14 00:47:31.694828 kubelet[1952]: I0514 00:47:31.694814 1952 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 14 00:47:31.694828 kubelet[1952]: I0514 00:47:31.694830 1952 policy_none.go:49] "None policy: Start" May 14 00:47:31.694887 kubelet[1952]: I0514 00:47:31.694838 1952 memory_manager.go:186] "Starting memorymanager" policy="None" May 14 00:47:31.694887 kubelet[1952]: I0514 00:47:31.694848 1952 state_mem.go:35] "Initializing new in-memory state store" May 14 00:47:31.694949 kubelet[1952]: I0514 00:47:31.694933 1952 state_mem.go:75] "Updated machine memory state" May 14 00:47:31.698102 kubelet[1952]: I0514 00:47:31.698072 1952 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 14 00:47:31.697000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:31.697000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:47:31.697000 audit[1952]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d577a0 a1=4000fb8168 a2=4000d57770 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:31.697000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:47:31.698315 kubelet[1952]: I0514 00:47:31.698140 1952 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 14 00:47:31.698315 kubelet[1952]: I0514 00:47:31.698278 1952 eviction_manager.go:189] "Eviction manager: starting control loop" May 14 00:47:31.698315 kubelet[1952]: I0514 00:47:31.698291 1952 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 14 00:47:31.698858 kubelet[1952]: I0514 00:47:31.698832 1952 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 14 00:47:31.699608 kubelet[1952]: E0514 00:47:31.699587 1952 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 14 00:47:31.777187 kubelet[1952]: I0514 00:47:31.777133 1952 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 14 00:47:31.777596 kubelet[1952]: I0514 00:47:31.777549 1952 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 14 00:47:31.777980 kubelet[1952]: I0514 00:47:31.777963 1952 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 14 00:47:31.784426 kubelet[1952]: E0514 00:47:31.784371 1952 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 14 00:47:31.785035 kubelet[1952]: E0514 00:47:31.785001 1952 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 14 00:47:31.785086 kubelet[1952]: E0514 00:47:31.785007 1952 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 14 00:47:31.802046 kubelet[1952]: I0514 00:47:31.802023 1952 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 14 00:47:31.809275 kubelet[1952]: I0514 00:47:31.809248 1952 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 14 00:47:31.809349 kubelet[1952]: I0514 00:47:31.809328 1952 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 14 00:47:31.843784 kubelet[1952]: I0514 00:47:31.843659 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:47:31.843784 kubelet[1952]: I0514 00:47:31.843707 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3aeed40be0d849a52f0486c6d2094fb0-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"3aeed40be0d849a52f0486c6d2094fb0\") " pod="kube-system/kube-apiserver-localhost" May 14 00:47:31.843784 kubelet[1952]: I0514 00:47:31.843726 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:47:31.843784 kubelet[1952]: I0514 00:47:31.843748 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:47:31.844477 kubelet[1952]: I0514 00:47:31.843767 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:47:31.844615 kubelet[1952]: I0514 00:47:31.844574 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3aeed40be0d849a52f0486c6d2094fb0-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"3aeed40be0d849a52f0486c6d2094fb0\") " pod="kube-system/kube-apiserver-localhost" May 14 00:47:31.844649 kubelet[1952]: I0514 00:47:31.844619 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3aeed40be0d849a52f0486c6d2094fb0-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"3aeed40be0d849a52f0486c6d2094fb0\") " pod="kube-system/kube-apiserver-localhost" May 14 00:47:31.844674 kubelet[1952]: I0514 00:47:31.844661 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:47:31.844705 kubelet[1952]: I0514 00:47:31.844677 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 14 00:47:32.085582 kubelet[1952]: E0514 00:47:32.085530 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:32.085735 kubelet[1952]: E0514 00:47:32.085601 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:32.085791 kubelet[1952]: E0514 00:47:32.085770 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:32.600000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 14 00:47:32.600000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400058e1c0 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:47:32.600000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:47:32.633752 kubelet[1952]: I0514 00:47:32.633701 1952 apiserver.go:52] "Watching apiserver" May 14 00:47:32.643328 kubelet[1952]: I0514 00:47:32.643279 1952 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 14 00:47:32.687529 kubelet[1952]: E0514 00:47:32.685060 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:32.687529 kubelet[1952]: I0514 00:47:32.685093 1952 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 14 00:47:32.687529 kubelet[1952]: I0514 00:47:32.685349 1952 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 14 00:47:32.695837 kubelet[1952]: E0514 00:47:32.695791 1952 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 14 00:47:32.695990 kubelet[1952]: E0514 00:47:32.695964 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:32.696304 kubelet[1952]: E0514 00:47:32.696276 1952 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 14 00:47:32.696387 kubelet[1952]: E0514 00:47:32.696370 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:32.721557 kubelet[1952]: I0514 00:47:32.721490 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.7214705759999998 podStartE2EDuration="2.721470576s" podCreationTimestamp="2025-05-14 00:47:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:47:32.712056105 +0000 UTC m=+1.129194390" watchObservedRunningTime="2025-05-14 00:47:32.721470576 +0000 UTC m=+1.138608821" May 14 00:47:32.729168 kubelet[1952]: I0514 00:47:32.729102 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.729084143 podStartE2EDuration="2.729084143s" podCreationTimestamp="2025-05-14 00:47:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:47:32.721800948 +0000 UTC m=+1.138939193" watchObservedRunningTime="2025-05-14 00:47:32.729084143 +0000 UTC m=+1.146222388" May 14 00:47:32.736610 kubelet[1952]: I0514 00:47:32.736553 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.736540707 podStartE2EDuration="2.736540707s" podCreationTimestamp="2025-05-14 00:47:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:47:32.729426079 +0000 UTC m=+1.146564324" watchObservedRunningTime="2025-05-14 00:47:32.736540707 +0000 UTC m=+1.153678912" May 14 00:47:33.686183 kubelet[1952]: E0514 00:47:33.686132 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:33.686546 kubelet[1952]: E0514 00:47:33.686215 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:35.264572 kubelet[1952]: E0514 00:47:35.264531 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:35.654000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:35.655579 kernel: kauditd_printk_skb: 637 callbacks suppressed May 14 00:47:35.655662 kernel: audit: type=1400 audit(1747183655.654:809): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:35.654000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001242cc0 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:47:35.662264 kernel: audit: type=1300 audit(1747183655.654:809): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001242cc0 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:47:35.662328 kernel: audit: type=1327 audit(1747183655.654:809): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:47:35.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:47:35.655000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:35.668237 kernel: audit: type=1400 audit(1747183655.655:810): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:35.668276 kernel: audit: type=1300 audit(1747183655.655:810): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40011fc120 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:47:35.655000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40011fc120 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:47:35.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:47:35.675120 kernel: audit: type=1327 audit(1747183655.655:810): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:47:35.675155 kernel: audit: type=1400 audit(1747183655.655:811): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:35.655000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:35.655000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40011fc160 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:47:35.681674 kernel: audit: type=1300 audit(1747183655.655:811): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40011fc160 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:47:35.681737 kernel: audit: type=1327 audit(1747183655.655:811): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:47:35.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:47:35.656000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:35.687547 kernel: audit: type=1400 audit(1747183655.656:812): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:47:35.656000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001242d00 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:47:35.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:47:36.560615 sudo[1348]: pam_unix(sudo:session): session closed for user root May 14 00:47:36.560000 audit[1348]: USER_END pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:36.560000 audit[1348]: CRED_DISP pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:36.562607 sshd[1344]: pam_unix(sshd:session): session closed for user core May 14 00:47:36.563000 audit[1344]: USER_END pid=1344 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:36.563000 audit[1344]: CRED_DISP pid=1344 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:36.564977 systemd[1]: session-7.scope: Deactivated successfully. May 14 00:47:36.565159 systemd[1]: session-7.scope: Consumed 7.058s CPU time. May 14 00:47:36.565613 systemd-logind[1200]: Session 7 logged out. Waiting for processes to exit. May 14 00:47:36.565716 systemd[1]: sshd@6-10.0.0.97:22-10.0.0.1:55360.service: Deactivated successfully. May 14 00:47:36.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.97:22-10.0.0.1:55360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:36.566703 systemd-logind[1200]: Removed session 7. May 14 00:47:37.122367 kubelet[1952]: I0514 00:47:37.122296 1952 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 14 00:47:37.122731 env[1212]: time="2025-05-14T00:47:37.122660588Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 14 00:47:37.122908 kubelet[1952]: I0514 00:47:37.122825 1952 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 14 00:47:37.828070 systemd[1]: Created slice kubepods-besteffort-pod0b89e2f5_69f9_4bbf_9856_618a8bf14c1f.slice. May 14 00:47:37.891198 kubelet[1952]: I0514 00:47:37.891138 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0b89e2f5-69f9-4bbf-9856-618a8bf14c1f-kube-proxy\") pod \"kube-proxy-sx8hg\" (UID: \"0b89e2f5-69f9-4bbf-9856-618a8bf14c1f\") " pod="kube-system/kube-proxy-sx8hg" May 14 00:47:37.891198 kubelet[1952]: I0514 00:47:37.891190 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0b89e2f5-69f9-4bbf-9856-618a8bf14c1f-xtables-lock\") pod \"kube-proxy-sx8hg\" (UID: \"0b89e2f5-69f9-4bbf-9856-618a8bf14c1f\") " pod="kube-system/kube-proxy-sx8hg" May 14 00:47:37.891198 kubelet[1952]: I0514 00:47:37.891207 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0b89e2f5-69f9-4bbf-9856-618a8bf14c1f-lib-modules\") pod \"kube-proxy-sx8hg\" (UID: \"0b89e2f5-69f9-4bbf-9856-618a8bf14c1f\") " pod="kube-system/kube-proxy-sx8hg" May 14 00:47:37.891434 kubelet[1952]: I0514 00:47:37.891228 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xkwcj\" (UniqueName: \"kubernetes.io/projected/0b89e2f5-69f9-4bbf-9856-618a8bf14c1f-kube-api-access-xkwcj\") pod \"kube-proxy-sx8hg\" (UID: \"0b89e2f5-69f9-4bbf-9856-618a8bf14c1f\") " pod="kube-system/kube-proxy-sx8hg" May 14 00:47:37.998985 kubelet[1952]: E0514 00:47:37.998951 1952 projected.go:288] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found May 14 00:47:37.999134 kubelet[1952]: E0514 00:47:37.999122 1952 projected.go:194] Error preparing data for projected volume kube-api-access-xkwcj for pod kube-system/kube-proxy-sx8hg: configmap "kube-root-ca.crt" not found May 14 00:47:37.999285 kubelet[1952]: E0514 00:47:37.999267 1952 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/0b89e2f5-69f9-4bbf-9856-618a8bf14c1f-kube-api-access-xkwcj podName:0b89e2f5-69f9-4bbf-9856-618a8bf14c1f nodeName:}" failed. No retries permitted until 2025-05-14 00:47:38.49924452 +0000 UTC m=+6.916382765 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-xkwcj" (UniqueName: "kubernetes.io/projected/0b89e2f5-69f9-4bbf-9856-618a8bf14c1f-kube-api-access-xkwcj") pod "kube-proxy-sx8hg" (UID: "0b89e2f5-69f9-4bbf-9856-618a8bf14c1f") : configmap "kube-root-ca.crt" not found May 14 00:47:38.309078 systemd[1]: Created slice kubepods-besteffort-podeeae3186_c267_47b5_9e41_710f5a4c67e0.slice. May 14 00:47:38.395940 kubelet[1952]: I0514 00:47:38.395887 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sxdlh\" (UniqueName: \"kubernetes.io/projected/eeae3186-c267-47b5-9e41-710f5a4c67e0-kube-api-access-sxdlh\") pod \"tigera-operator-789496d6f5-qt7fv\" (UID: \"eeae3186-c267-47b5-9e41-710f5a4c67e0\") " pod="tigera-operator/tigera-operator-789496d6f5-qt7fv" May 14 00:47:38.395940 kubelet[1952]: I0514 00:47:38.395943 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/eeae3186-c267-47b5-9e41-710f5a4c67e0-var-lib-calico\") pod \"tigera-operator-789496d6f5-qt7fv\" (UID: \"eeae3186-c267-47b5-9e41-710f5a4c67e0\") " pod="tigera-operator/tigera-operator-789496d6f5-qt7fv" May 14 00:47:38.505736 kubelet[1952]: I0514 00:47:38.505700 1952 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 14 00:47:38.613044 env[1212]: time="2025-05-14T00:47:38.612928047Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-qt7fv,Uid:eeae3186-c267-47b5-9e41-710f5a4c67e0,Namespace:tigera-operator,Attempt:0,}" May 14 00:47:38.630419 env[1212]: time="2025-05-14T00:47:38.630341764Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:47:38.630419 env[1212]: time="2025-05-14T00:47:38.630382172Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:47:38.630419 env[1212]: time="2025-05-14T00:47:38.630404376Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:47:38.630568 env[1212]: time="2025-05-14T00:47:38.630526441Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c228900b3740181ebe3e2993aaf02dab03e7cd2d3e0127b07a52f6658a48a15d pid=2050 runtime=io.containerd.runc.v2 May 14 00:47:38.644653 systemd[1]: Started cri-containerd-c228900b3740181ebe3e2993aaf02dab03e7cd2d3e0127b07a52f6658a48a15d.scope. May 14 00:47:38.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.665000 audit: BPF prog-id=103 op=LOAD May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2050 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323839303062333734303138316562653365323939336161663032 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2050 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323839303062333734303138316562653365323939336161663032 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit: BPF prog-id=104 op=LOAD May 14 00:47:38.666000 audit[2060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2050 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323839303062333734303138316562653365323939336161663032 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit: BPF prog-id=105 op=LOAD May 14 00:47:38.666000 audit[2060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2050 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323839303062333734303138316562653365323939336161663032 May 14 00:47:38.666000 audit: BPF prog-id=105 op=UNLOAD May 14 00:47:38.666000 audit: BPF prog-id=104 op=UNLOAD May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.666000 audit: BPF prog-id=106 op=LOAD May 14 00:47:38.666000 audit[2060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2050 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323839303062333734303138316562653365323939336161663032 May 14 00:47:38.686736 env[1212]: time="2025-05-14T00:47:38.686685455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-qt7fv,Uid:eeae3186-c267-47b5-9e41-710f5a4c67e0,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c228900b3740181ebe3e2993aaf02dab03e7cd2d3e0127b07a52f6658a48a15d\"" May 14 00:47:38.688650 env[1212]: time="2025-05-14T00:47:38.688624242Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 14 00:47:38.736878 kubelet[1952]: E0514 00:47:38.736842 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:38.737896 env[1212]: time="2025-05-14T00:47:38.737859713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sx8hg,Uid:0b89e2f5-69f9-4bbf-9856-618a8bf14c1f,Namespace:kube-system,Attempt:0,}" May 14 00:47:38.754659 env[1212]: time="2025-05-14T00:47:38.754582813Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:47:38.754659 env[1212]: time="2025-05-14T00:47:38.754620140Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:47:38.754659 env[1212]: time="2025-05-14T00:47:38.754631422Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:47:38.754871 env[1212]: time="2025-05-14T00:47:38.754739564Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a95b176344d6f19d65758e56804d77fc4d1a792b82b96808678737594e06f3aa pid=2091 runtime=io.containerd.runc.v2 May 14 00:47:38.765251 systemd[1]: Started cri-containerd-a95b176344d6f19d65758e56804d77fc4d1a792b82b96808678737594e06f3aa.scope. May 14 00:47:38.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.797000 audit: BPF prog-id=107 op=LOAD May 14 00:47:38.798000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit[2101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2091 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139356231373633343464366631396436353735386535363830346437 May 14 00:47:38.798000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit[2101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2091 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139356231373633343464366631396436353735386535363830346437 May 14 00:47:38.798000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.798000 audit: BPF prog-id=108 op=LOAD May 14 00:47:38.798000 audit[2101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2091 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139356231373633343464366631396436353735386535363830346437 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit: BPF prog-id=109 op=LOAD May 14 00:47:38.799000 audit[2101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2091 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139356231373633343464366631396436353735386535363830346437 May 14 00:47:38.799000 audit: BPF prog-id=109 op=UNLOAD May 14 00:47:38.799000 audit: BPF prog-id=108 op=UNLOAD May 14 00:47:38.799000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.799000 audit: BPF prog-id=110 op=LOAD May 14 00:47:38.799000 audit[2101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2091 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139356231373633343464366631396436353735386535363830346437 May 14 00:47:38.811198 env[1212]: time="2025-05-14T00:47:38.811156429Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sx8hg,Uid:0b89e2f5-69f9-4bbf-9856-618a8bf14c1f,Namespace:kube-system,Attempt:0,} returns sandbox id \"a95b176344d6f19d65758e56804d77fc4d1a792b82b96808678737594e06f3aa\"" May 14 00:47:38.812327 kubelet[1952]: E0514 00:47:38.811859 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:38.814437 env[1212]: time="2025-05-14T00:47:38.814285294Z" level=info msg="CreateContainer within sandbox \"a95b176344d6f19d65758e56804d77fc4d1a792b82b96808678737594e06f3aa\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 14 00:47:38.828186 env[1212]: time="2025-05-14T00:47:38.828138220Z" level=info msg="CreateContainer within sandbox \"a95b176344d6f19d65758e56804d77fc4d1a792b82b96808678737594e06f3aa\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"dab63fe4707027f4a22e1e89e599065cb08adcf084e71d0b42b952deda987076\"" May 14 00:47:38.828689 env[1212]: time="2025-05-14T00:47:38.828663205Z" level=info msg="StartContainer for \"dab63fe4707027f4a22e1e89e599065cb08adcf084e71d0b42b952deda987076\"" May 14 00:47:38.843255 systemd[1]: Started cri-containerd-dab63fe4707027f4a22e1e89e599065cb08adcf084e71d0b42b952deda987076.scope. May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2091 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461623633666534373037303237663461323265316538396535393930 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit: BPF prog-id=111 op=LOAD May 14 00:47:38.864000 audit[2132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2091 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461623633666534373037303237663461323265316538396535393930 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit: BPF prog-id=112 op=LOAD May 14 00:47:38.864000 audit[2132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2091 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461623633666534373037303237663461323265316538396535393930 May 14 00:47:38.864000 audit: BPF prog-id=112 op=UNLOAD May 14 00:47:38.864000 audit: BPF prog-id=111 op=UNLOAD May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:38.864000 audit: BPF prog-id=113 op=LOAD May 14 00:47:38.864000 audit[2132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2091 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:38.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461623633666534373037303237663461323265316538396535393930 May 14 00:47:38.883580 env[1212]: time="2025-05-14T00:47:38.883519679Z" level=info msg="StartContainer for \"dab63fe4707027f4a22e1e89e599065cb08adcf084e71d0b42b952deda987076\" returns successfully" May 14 00:47:39.078000 audit[2194]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.078000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7b601a0 a2=0 a3=1 items=0 ppid=2144 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 14 00:47:39.079000 audit[2196]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.079000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4aecb90 a2=0 a3=1 items=0 ppid=2144 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 14 00:47:39.080000 audit[2195]: NETFILTER_CFG table=mangle:40 family=2 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.080000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1ebe6c0 a2=0 a3=1 items=0 ppid=2144 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 14 00:47:39.083000 audit[2198]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.083000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5da60a0 a2=0 a3=1 items=0 ppid=2144 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 14 00:47:39.084000 audit[2197]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.084000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb225cd0 a2=0 a3=1 items=0 ppid=2144 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 14 00:47:39.086000 audit[2199]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.086000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcde6eec0 a2=0 a3=1 items=0 ppid=2144 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.086000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 14 00:47:39.182000 audit[2200]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.182000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffeab9f270 a2=0 a3=1 items=0 ppid=2144 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 14 00:47:39.185000 audit[2202]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.185000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd6af7230 a2=0 a3=1 items=0 ppid=2144 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 14 00:47:39.190000 audit[2205]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.190000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd3aac520 a2=0 a3=1 items=0 ppid=2144 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 14 00:47:39.191000 audit[2206]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.191000 audit[2206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6fee760 a2=0 a3=1 items=0 ppid=2144 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 14 00:47:39.194000 audit[2208]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.194000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffff800250 a2=0 a3=1 items=0 ppid=2144 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.194000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 14 00:47:39.195000 audit[2209]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.195000 audit[2209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7ce24b0 a2=0 a3=1 items=0 ppid=2144 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 14 00:47:39.198000 audit[2211]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.198000 audit[2211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe627d1a0 a2=0 a3=1 items=0 ppid=2144 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 14 00:47:39.202000 audit[2214]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.202000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdf8222f0 a2=0 a3=1 items=0 ppid=2144 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 14 00:47:39.203000 audit[2215]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.203000 audit[2215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffeb6f1f0 a2=0 a3=1 items=0 ppid=2144 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 14 00:47:39.205000 audit[2217]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.205000 audit[2217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffecb789b0 a2=0 a3=1 items=0 ppid=2144 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 14 00:47:39.206000 audit[2218]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.206000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeef66e20 a2=0 a3=1 items=0 ppid=2144 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 14 00:47:39.209000 audit[2220]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.209000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffce4fe640 a2=0 a3=1 items=0 ppid=2144 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:47:39.212000 audit[2223]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.212000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc639d3d0 a2=0 a3=1 items=0 ppid=2144 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:47:39.216000 audit[2226]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.216000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffec308660 a2=0 a3=1 items=0 ppid=2144 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.216000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 14 00:47:39.217000 audit[2227]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.217000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffda50a1b0 a2=0 a3=1 items=0 ppid=2144 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 14 00:47:39.220000 audit[2229]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.220000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc2ed5790 a2=0 a3=1 items=0 ppid=2144 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:47:39.225000 audit[2232]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.225000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffde3d3f50 a2=0 a3=1 items=0 ppid=2144 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:47:39.226000 audit[2233]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.226000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf501e60 a2=0 a3=1 items=0 ppid=2144 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 14 00:47:39.228000 audit[2235]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:39.228000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffffb3a6bd0 a2=0 a3=1 items=0 ppid=2144 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 14 00:47:39.252000 audit[2242]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:39.252000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffe063d340 a2=0 a3=1 items=0 ppid=2144 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:39.261000 audit[2242]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:39.261000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffe063d340 a2=0 a3=1 items=0 ppid=2144 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:39.263000 audit[2247]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.263000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffec274540 a2=0 a3=1 items=0 ppid=2144 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 14 00:47:39.265000 audit[2249]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.265000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc794a350 a2=0 a3=1 items=0 ppid=2144 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 14 00:47:39.269000 audit[2252]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.269000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc22a5b10 a2=0 a3=1 items=0 ppid=2144 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 14 00:47:39.271000 audit[2253]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.271000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6a61ee0 a2=0 a3=1 items=0 ppid=2144 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 14 00:47:39.273000 audit[2255]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.273000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc962cc60 a2=0 a3=1 items=0 ppid=2144 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 14 00:47:39.274000 audit[2256]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.274000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe68cc0c0 a2=0 a3=1 items=0 ppid=2144 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 14 00:47:39.276000 audit[2258]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.276000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc54bbac0 a2=0 a3=1 items=0 ppid=2144 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 14 00:47:39.279000 audit[2261]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.279000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe216f0f0 a2=0 a3=1 items=0 ppid=2144 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 14 00:47:39.280000 audit[2262]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.280000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe7758cf0 a2=0 a3=1 items=0 ppid=2144 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 14 00:47:39.282000 audit[2264]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.282000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcd9ff6a0 a2=0 a3=1 items=0 ppid=2144 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 14 00:47:39.284000 audit[2265]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.284000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd4cf5b0 a2=0 a3=1 items=0 ppid=2144 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 14 00:47:39.286000 audit[2267]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.286000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcc7e78d0 a2=0 a3=1 items=0 ppid=2144 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:47:39.289000 audit[2270]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.289000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff54e4130 a2=0 a3=1 items=0 ppid=2144 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 14 00:47:39.293000 audit[2273]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.293000 audit[2273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc0983730 a2=0 a3=1 items=0 ppid=2144 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 14 00:47:39.294000 audit[2274]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.294000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc249ba80 a2=0 a3=1 items=0 ppid=2144 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 14 00:47:39.296000 audit[2276]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.296000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdbba7610 a2=0 a3=1 items=0 ppid=2144 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:47:39.299000 audit[2279]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.299000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc054aab0 a2=0 a3=1 items=0 ppid=2144 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:47:39.300000 audit[2280]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.300000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca86b210 a2=0 a3=1 items=0 ppid=2144 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 14 00:47:39.303000 audit[2282]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.303000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcac42d60 a2=0 a3=1 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 14 00:47:39.304000 audit[2283]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.304000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2389910 a2=0 a3=1 items=0 ppid=2144 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 14 00:47:39.306000 audit[2285]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.306000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffece4f570 a2=0 a3=1 items=0 ppid=2144 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:47:39.309000 audit[2288]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:39.309000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffd1b6790 a2=0 a3=1 items=0 ppid=2144 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:47:39.311000 audit[2290]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 14 00:47:39.311000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=fffffd6e83e0 a2=0 a3=1 items=0 ppid=2144 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.311000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:39.311000 audit[2290]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 14 00:47:39.311000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffffd6e83e0 a2=0 a3=1 items=0 ppid=2144 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:39.311000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:39.696752 kubelet[1952]: E0514 00:47:39.696710 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:39.706635 kubelet[1952]: I0514 00:47:39.706073 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-sx8hg" podStartSLOduration=2.7060527800000003 podStartE2EDuration="2.70605278s" podCreationTimestamp="2025-05-14 00:47:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:47:39.705177894 +0000 UTC m=+8.122316139" watchObservedRunningTime="2025-05-14 00:47:39.70605278 +0000 UTC m=+8.123190985" May 14 00:47:39.796902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2691512997.mount: Deactivated successfully. May 14 00:47:40.347944 env[1212]: time="2025-05-14T00:47:40.347895348Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:40.349893 env[1212]: time="2025-05-14T00:47:40.349864181Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:40.351717 env[1212]: time="2025-05-14T00:47:40.351685548Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:40.353133 env[1212]: time="2025-05-14T00:47:40.353106883Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:40.353776 env[1212]: time="2025-05-14T00:47:40.353750718Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 14 00:47:40.358313 env[1212]: time="2025-05-14T00:47:40.357803685Z" level=info msg="CreateContainer within sandbox \"c228900b3740181ebe3e2993aaf02dab03e7cd2d3e0127b07a52f6658a48a15d\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 14 00:47:40.368043 env[1212]: time="2025-05-14T00:47:40.368009034Z" level=info msg="CreateContainer within sandbox \"c228900b3740181ebe3e2993aaf02dab03e7cd2d3e0127b07a52f6658a48a15d\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"6a4970191c02e6a45c3e824c9db61bd958c0ce019523f29dc40a91bcf9c7cb14\"" May 14 00:47:40.368482 env[1212]: time="2025-05-14T00:47:40.368458755Z" level=info msg="StartContainer for \"6a4970191c02e6a45c3e824c9db61bd958c0ce019523f29dc40a91bcf9c7cb14\"" May 14 00:47:40.391073 systemd[1]: Started cri-containerd-6a4970191c02e6a45c3e824c9db61bd958c0ce019523f29dc40a91bcf9c7cb14.scope. May 14 00:47:40.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.420000 audit: BPF prog-id=114 op=LOAD May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2050 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:40.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661343937303139316330326536613435633365383234633964623631 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2050 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:40.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661343937303139316330326536613435633365383234633964623631 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit: BPF prog-id=115 op=LOAD May 14 00:47:40.421000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2050 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:40.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661343937303139316330326536613435633365383234633964623631 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit: BPF prog-id=116 op=LOAD May 14 00:47:40.421000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2050 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:40.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661343937303139316330326536613435633365383234633964623631 May 14 00:47:40.421000 audit: BPF prog-id=116 op=UNLOAD May 14 00:47:40.421000 audit: BPF prog-id=115 op=UNLOAD May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:40.421000 audit: BPF prog-id=117 op=LOAD May 14 00:47:40.421000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2050 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:40.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661343937303139316330326536613435633365383234633964623631 May 14 00:47:40.428255 kubelet[1952]: E0514 00:47:40.428204 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:40.447905 env[1212]: time="2025-05-14T00:47:40.447843346Z" level=info msg="StartContainer for \"6a4970191c02e6a45c3e824c9db61bd958c0ce019523f29dc40a91bcf9c7cb14\" returns successfully" May 14 00:47:40.699238 kubelet[1952]: E0514 00:47:40.699137 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:40.708783 kubelet[1952]: I0514 00:47:40.708720 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-qt7fv" podStartSLOduration=1.041638192 podStartE2EDuration="2.708706029s" podCreationTimestamp="2025-05-14 00:47:38 +0000 UTC" firstStartedPulling="2025-05-14 00:47:38.687999437 +0000 UTC m=+7.105137682" lastFinishedPulling="2025-05-14 00:47:40.355067274 +0000 UTC m=+8.772205519" observedRunningTime="2025-05-14 00:47:40.708443262 +0000 UTC m=+9.125581547" watchObservedRunningTime="2025-05-14 00:47:40.708706029 +0000 UTC m=+9.125844274" May 14 00:47:41.905297 kubelet[1952]: E0514 00:47:41.902481 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:42.701867 kubelet[1952]: E0514 00:47:42.701792 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:43.688000 audit[2333]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:43.690585 kernel: kauditd_printk_skb: 374 callbacks suppressed May 14 00:47:43.690648 kernel: audit: type=1325 audit(1747183663.688:929): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:43.688000 audit[2333]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffff0e78fc0 a2=0 a3=1 items=0 ppid=2144 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:43.696146 kernel: audit: type=1300 audit(1747183663.688:929): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffff0e78fc0 a2=0 a3=1 items=0 ppid=2144 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:43.696193 kernel: audit: type=1327 audit(1747183663.688:929): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:43.688000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:43.707000 audit[2333]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:43.707000 audit[2333]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff0e78fc0 a2=0 a3=1 items=0 ppid=2144 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:43.715572 kernel: audit: type=1325 audit(1747183663.707:930): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:43.715649 kernel: audit: type=1300 audit(1747183663.707:930): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff0e78fc0 a2=0 a3=1 items=0 ppid=2144 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:43.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:43.725113 kernel: audit: type=1327 audit(1747183663.707:930): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:43.730000 audit[2335]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:43.730000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffffe855350 a2=0 a3=1 items=0 ppid=2144 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:43.737600 kernel: audit: type=1325 audit(1747183663.730:931): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:43.737644 kernel: audit: type=1300 audit(1747183663.730:931): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffffe855350 a2=0 a3=1 items=0 ppid=2144 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:43.737666 kernel: audit: type=1327 audit(1747183663.730:931): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:43.730000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:43.742000 audit[2335]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:43.742000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffe855350 a2=0 a3=1 items=0 ppid=2144 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:43.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:43.746408 kernel: audit: type=1325 audit(1747183663.742:932): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:43.824574 systemd[1]: Created slice kubepods-besteffort-pod096a221f_a99d_4950_92de_fcb13d7c8ed1.slice. May 14 00:47:43.835136 kubelet[1952]: I0514 00:47:43.835099 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/096a221f-a99d-4950-92de-fcb13d7c8ed1-typha-certs\") pod \"calico-typha-85cbb9c569-d8vsh\" (UID: \"096a221f-a99d-4950-92de-fcb13d7c8ed1\") " pod="calico-system/calico-typha-85cbb9c569-d8vsh" May 14 00:47:43.835613 kubelet[1952]: I0514 00:47:43.835144 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/096a221f-a99d-4950-92de-fcb13d7c8ed1-tigera-ca-bundle\") pod \"calico-typha-85cbb9c569-d8vsh\" (UID: \"096a221f-a99d-4950-92de-fcb13d7c8ed1\") " pod="calico-system/calico-typha-85cbb9c569-d8vsh" May 14 00:47:43.835613 kubelet[1952]: I0514 00:47:43.835167 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nj4sx\" (UniqueName: \"kubernetes.io/projected/096a221f-a99d-4950-92de-fcb13d7c8ed1-kube-api-access-nj4sx\") pod \"calico-typha-85cbb9c569-d8vsh\" (UID: \"096a221f-a99d-4950-92de-fcb13d7c8ed1\") " pod="calico-system/calico-typha-85cbb9c569-d8vsh" May 14 00:47:43.897507 systemd[1]: Created slice kubepods-besteffort-pod488c72f5_a178_4203_92c4_383224d569af.slice. May 14 00:47:43.935565 kubelet[1952]: I0514 00:47:43.935518 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/488c72f5-a178-4203-92c4-383224d569af-cni-log-dir\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:43.935709 kubelet[1952]: I0514 00:47:43.935568 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-knp9x\" (UniqueName: \"kubernetes.io/projected/488c72f5-a178-4203-92c4-383224d569af-kube-api-access-knp9x\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:43.935709 kubelet[1952]: I0514 00:47:43.935596 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/488c72f5-a178-4203-92c4-383224d569af-policysync\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:43.935709 kubelet[1952]: I0514 00:47:43.935614 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/488c72f5-a178-4203-92c4-383224d569af-var-lib-calico\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:43.935709 kubelet[1952]: I0514 00:47:43.935651 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/488c72f5-a178-4203-92c4-383224d569af-node-certs\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:43.935709 kubelet[1952]: I0514 00:47:43.935667 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/488c72f5-a178-4203-92c4-383224d569af-var-run-calico\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:43.935870 kubelet[1952]: I0514 00:47:43.935685 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/488c72f5-a178-4203-92c4-383224d569af-cni-net-dir\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:43.935870 kubelet[1952]: I0514 00:47:43.935699 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/488c72f5-a178-4203-92c4-383224d569af-flexvol-driver-host\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:43.935870 kubelet[1952]: I0514 00:47:43.935721 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/488c72f5-a178-4203-92c4-383224d569af-cni-bin-dir\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:43.935870 kubelet[1952]: I0514 00:47:43.935757 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/488c72f5-a178-4203-92c4-383224d569af-lib-modules\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:43.935870 kubelet[1952]: I0514 00:47:43.935771 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/488c72f5-a178-4203-92c4-383224d569af-tigera-ca-bundle\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:43.935977 kubelet[1952]: I0514 00:47:43.935805 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/488c72f5-a178-4203-92c4-383224d569af-xtables-lock\") pod \"calico-node-xlnr5\" (UID: \"488c72f5-a178-4203-92c4-383224d569af\") " pod="calico-system/calico-node-xlnr5" May 14 00:47:44.018539 kubelet[1952]: E0514 00:47:44.018219 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9mq7g" podUID="c9b4d85b-ed70-4abb-84fe-dbae253e2eb2" May 14 00:47:44.037595 kubelet[1952]: I0514 00:47:44.036673 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c9b4d85b-ed70-4abb-84fe-dbae253e2eb2-registration-dir\") pod \"csi-node-driver-9mq7g\" (UID: \"c9b4d85b-ed70-4abb-84fe-dbae253e2eb2\") " pod="calico-system/csi-node-driver-9mq7g" May 14 00:47:44.037595 kubelet[1952]: I0514 00:47:44.036749 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c9b4d85b-ed70-4abb-84fe-dbae253e2eb2-kubelet-dir\") pod \"csi-node-driver-9mq7g\" (UID: \"c9b4d85b-ed70-4abb-84fe-dbae253e2eb2\") " pod="calico-system/csi-node-driver-9mq7g" May 14 00:47:44.037595 kubelet[1952]: I0514 00:47:44.036782 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ndxpd\" (UniqueName: \"kubernetes.io/projected/c9b4d85b-ed70-4abb-84fe-dbae253e2eb2-kube-api-access-ndxpd\") pod \"csi-node-driver-9mq7g\" (UID: \"c9b4d85b-ed70-4abb-84fe-dbae253e2eb2\") " pod="calico-system/csi-node-driver-9mq7g" May 14 00:47:44.037595 kubelet[1952]: I0514 00:47:44.036801 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c9b4d85b-ed70-4abb-84fe-dbae253e2eb2-varrun\") pod \"csi-node-driver-9mq7g\" (UID: \"c9b4d85b-ed70-4abb-84fe-dbae253e2eb2\") " pod="calico-system/csi-node-driver-9mq7g" May 14 00:47:44.037595 kubelet[1952]: I0514 00:47:44.036839 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c9b4d85b-ed70-4abb-84fe-dbae253e2eb2-socket-dir\") pod \"csi-node-driver-9mq7g\" (UID: \"c9b4d85b-ed70-4abb-84fe-dbae253e2eb2\") " pod="calico-system/csi-node-driver-9mq7g" May 14 00:47:44.039587 kubelet[1952]: E0514 00:47:44.039538 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.039587 kubelet[1952]: W0514 00:47:44.039563 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.039587 kubelet[1952]: E0514 00:47:44.039590 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.043442 kubelet[1952]: E0514 00:47:44.041541 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.043442 kubelet[1952]: W0514 00:47:44.041560 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.043442 kubelet[1952]: E0514 00:47:44.041603 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.043442 kubelet[1952]: E0514 00:47:44.042281 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.043442 kubelet[1952]: W0514 00:47:44.042290 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.043442 kubelet[1952]: E0514 00:47:44.042946 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.043663 kubelet[1952]: E0514 00:47:44.043501 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.043663 kubelet[1952]: W0514 00:47:44.043512 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.043773 kubelet[1952]: E0514 00:47:44.043756 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.045654 kubelet[1952]: E0514 00:47:44.045612 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.045654 kubelet[1952]: W0514 00:47:44.045653 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.045763 kubelet[1952]: E0514 00:47:44.045667 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.047909 kubelet[1952]: E0514 00:47:44.047885 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.047909 kubelet[1952]: W0514 00:47:44.047903 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.048021 kubelet[1952]: E0514 00:47:44.047917 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.053523 kubelet[1952]: E0514 00:47:44.053495 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.053523 kubelet[1952]: W0514 00:47:44.053515 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.053672 kubelet[1952]: E0514 00:47:44.053534 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.129174 kubelet[1952]: E0514 00:47:44.129136 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:44.130096 env[1212]: time="2025-05-14T00:47:44.129658196Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-85cbb9c569-d8vsh,Uid:096a221f-a99d-4950-92de-fcb13d7c8ed1,Namespace:calico-system,Attempt:0,}" May 14 00:47:44.138123 kubelet[1952]: E0514 00:47:44.137617 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.138123 kubelet[1952]: W0514 00:47:44.137640 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.138123 kubelet[1952]: E0514 00:47:44.137660 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.138913 kubelet[1952]: E0514 00:47:44.138889 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.138913 kubelet[1952]: W0514 00:47:44.138912 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.139004 kubelet[1952]: E0514 00:47:44.138930 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.140684 kubelet[1952]: E0514 00:47:44.140666 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.140684 kubelet[1952]: W0514 00:47:44.140682 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.140793 kubelet[1952]: E0514 00:47:44.140777 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.140855 kubelet[1952]: E0514 00:47:44.140842 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.140855 kubelet[1952]: W0514 00:47:44.140848 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.140964 kubelet[1952]: E0514 00:47:44.140938 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.141056 kubelet[1952]: E0514 00:47:44.140975 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.141145 kubelet[1952]: W0514 00:47:44.141130 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.141217 kubelet[1952]: E0514 00:47:44.141204 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.141521 kubelet[1952]: E0514 00:47:44.141502 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.142187 kubelet[1952]: W0514 00:47:44.142165 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.142448 kubelet[1952]: E0514 00:47:44.142429 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.142736 kubelet[1952]: E0514 00:47:44.142719 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.142791 kubelet[1952]: W0514 00:47:44.142734 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.142830 kubelet[1952]: E0514 00:47:44.142797 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.143070 kubelet[1952]: E0514 00:47:44.143049 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.143070 kubelet[1952]: W0514 00:47:44.143069 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.143152 kubelet[1952]: E0514 00:47:44.143088 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.143323 kubelet[1952]: E0514 00:47:44.143303 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.143366 kubelet[1952]: W0514 00:47:44.143323 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.143453 kubelet[1952]: E0514 00:47:44.143436 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.143654 env[1212]: time="2025-05-14T00:47:44.143589824Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:47:44.143654 env[1212]: time="2025-05-14T00:47:44.143633070Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:47:44.143654 env[1212]: time="2025-05-14T00:47:44.143643392Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:47:44.143839 kubelet[1952]: E0514 00:47:44.143820 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.143839 kubelet[1952]: W0514 00:47:44.143837 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.143941 kubelet[1952]: E0514 00:47:44.143924 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.144049 env[1212]: time="2025-05-14T00:47:44.143998444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d pid=2360 runtime=io.containerd.runc.v2 May 14 00:47:44.144549 kubelet[1952]: E0514 00:47:44.144521 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.144549 kubelet[1952]: W0514 00:47:44.144536 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.144643 kubelet[1952]: E0514 00:47:44.144627 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.144724 kubelet[1952]: E0514 00:47:44.144707 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.144724 kubelet[1952]: W0514 00:47:44.144717 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.144872 kubelet[1952]: E0514 00:47:44.144854 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.144872 kubelet[1952]: W0514 00:47:44.144866 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.144971 kubelet[1952]: E0514 00:47:44.144955 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.145063 kubelet[1952]: E0514 00:47:44.145001 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.145063 kubelet[1952]: W0514 00:47:44.145061 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.145123 kubelet[1952]: E0514 00:47:44.145006 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.145123 kubelet[1952]: E0514 00:47:44.145111 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.145679 kubelet[1952]: E0514 00:47:44.145660 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.145679 kubelet[1952]: W0514 00:47:44.145677 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.145818 kubelet[1952]: E0514 00:47:44.145799 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.146751 kubelet[1952]: E0514 00:47:44.146731 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.146812 kubelet[1952]: W0514 00:47:44.146754 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.146812 kubelet[1952]: E0514 00:47:44.146768 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.147557 kubelet[1952]: E0514 00:47:44.147538 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.147557 kubelet[1952]: W0514 00:47:44.147556 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.147662 kubelet[1952]: E0514 00:47:44.147574 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.147870 kubelet[1952]: E0514 00:47:44.147823 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.147914 kubelet[1952]: W0514 00:47:44.147872 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.147951 kubelet[1952]: E0514 00:47:44.147923 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.148060 kubelet[1952]: E0514 00:47:44.148038 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.148060 kubelet[1952]: W0514 00:47:44.148050 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.148238 kubelet[1952]: E0514 00:47:44.148219 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.148904 kubelet[1952]: E0514 00:47:44.148885 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.148904 kubelet[1952]: W0514 00:47:44.148902 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.149002 kubelet[1952]: E0514 00:47:44.148948 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.149099 kubelet[1952]: E0514 00:47:44.149086 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.149099 kubelet[1952]: W0514 00:47:44.149097 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.149174 kubelet[1952]: E0514 00:47:44.149163 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.149854 kubelet[1952]: E0514 00:47:44.149836 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.149854 kubelet[1952]: W0514 00:47:44.149853 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.149965 kubelet[1952]: E0514 00:47:44.149951 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.150035 kubelet[1952]: E0514 00:47:44.150024 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.150035 kubelet[1952]: W0514 00:47:44.150033 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.150087 kubelet[1952]: E0514 00:47:44.150045 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.151558 kubelet[1952]: E0514 00:47:44.151473 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.151703 kubelet[1952]: W0514 00:47:44.151661 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.151795 kubelet[1952]: E0514 00:47:44.151778 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.152559 kubelet[1952]: E0514 00:47:44.152536 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.153439 kubelet[1952]: W0514 00:47:44.152743 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.153439 kubelet[1952]: E0514 00:47:44.152764 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.163581 systemd[1]: Started cri-containerd-9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d.scope. May 14 00:47:44.166816 kubelet[1952]: E0514 00:47:44.166790 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:44.166963 kubelet[1952]: W0514 00:47:44.166948 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:44.167045 kubelet[1952]: E0514 00:47:44.167030 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:44.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.198000 audit: BPF prog-id=118 op=LOAD May 14 00:47:44.200701 kubelet[1952]: E0514 00:47:44.200666 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:44.199000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201171 env[1212]: time="2025-05-14T00:47:44.201130919Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xlnr5,Uid:488c72f5-a178-4203-92c4-383224d569af,Namespace:calico-system,Attempt:0,}" May 14 00:47:44.199000 audit[2379]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2360 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939333638363862656135663339616439303137353833326339363031 May 14 00:47:44.200000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.200000 audit[2379]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2360 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939333638363862656135663339616439303137353833326339363031 May 14 00:47:44.200000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.200000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.200000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.200000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.200000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.200000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.200000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.200000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.200000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.200000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.200000 audit: BPF prog-id=119 op=LOAD May 14 00:47:44.200000 audit[2379]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2360 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939333638363862656135663339616439303137353833326339363031 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit: BPF prog-id=120 op=LOAD May 14 00:47:44.201000 audit[2379]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2360 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939333638363862656135663339616439303137353833326339363031 May 14 00:47:44.201000 audit: BPF prog-id=120 op=UNLOAD May 14 00:47:44.201000 audit: BPF prog-id=119 op=UNLOAD May 14 00:47:44.201000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.201000 audit: BPF prog-id=121 op=LOAD May 14 00:47:44.201000 audit[2379]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2360 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939333638363862656135663339616439303137353833326339363031 May 14 00:47:44.221302 env[1212]: time="2025-05-14T00:47:44.221245167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-85cbb9c569-d8vsh,Uid:096a221f-a99d-4950-92de-fcb13d7c8ed1,Namespace:calico-system,Attempt:0,} returns sandbox id \"9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d\"" May 14 00:47:44.222702 kubelet[1952]: E0514 00:47:44.222668 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:44.223763 env[1212]: time="2025-05-14T00:47:44.223709365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 14 00:47:44.253415 env[1212]: time="2025-05-14T00:47:44.253336398Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:47:44.253415 env[1212]: time="2025-05-14T00:47:44.253376243Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:47:44.253415 env[1212]: time="2025-05-14T00:47:44.253386485Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:47:44.253690 env[1212]: time="2025-05-14T00:47:44.253603956Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7e4439a8ed3f756be2ee5b464027ff6c024a8e37452e25220166baecac71155f pid=2423 runtime=io.containerd.runc.v2 May 14 00:47:44.262850 systemd[1]: Started cri-containerd-7e4439a8ed3f756be2ee5b464027ff6c024a8e37452e25220166baecac71155f.scope. May 14 00:47:44.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.317000 audit: BPF prog-id=122 op=LOAD May 14 00:47:44.317000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.317000 audit[2432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2423 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343433396138656433663735366265326565356234363430323766 May 14 00:47:44.318000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.318000 audit[2432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2423 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343433396138656433663735366265326565356234363430323766 May 14 00:47:44.318000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.318000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.318000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.318000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.318000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.318000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.318000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.318000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.318000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.318000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.318000 audit: BPF prog-id=123 op=LOAD May 14 00:47:44.318000 audit[2432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2423 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343433396138656433663735366265326565356234363430323766 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit: BPF prog-id=124 op=LOAD May 14 00:47:44.319000 audit[2432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2423 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343433396138656433663735366265326565356234363430323766 May 14 00:47:44.319000 audit: BPF prog-id=124 op=UNLOAD May 14 00:47:44.319000 audit: BPF prog-id=123 op=UNLOAD May 14 00:47:44.319000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:44.319000 audit: BPF prog-id=125 op=LOAD May 14 00:47:44.319000 audit[2432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2423 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343433396138656433663735366265326565356234363430323766 May 14 00:47:44.336598 env[1212]: time="2025-05-14T00:47:44.336537707Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xlnr5,Uid:488c72f5-a178-4203-92c4-383224d569af,Namespace:calico-system,Attempt:0,} returns sandbox id \"7e4439a8ed3f756be2ee5b464027ff6c024a8e37452e25220166baecac71155f\"" May 14 00:47:44.337309 kubelet[1952]: E0514 00:47:44.337275 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:44.753000 audit[2456]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:44.753000 audit[2456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffc255a6f0 a2=0 a3=1 items=0 ppid=2144 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:44.764000 audit[2456]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:47:44.764000 audit[2456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc255a6f0 a2=0 a3=1 items=0 ppid=2144 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:44.764000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:47:44.960709 update_engine[1202]: I0514 00:47:44.960323 1202 update_attempter.cc:509] Updating boot flags... May 14 00:47:45.273061 kubelet[1952]: E0514 00:47:45.273025 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:45.328260 kubelet[1952]: E0514 00:47:45.328227 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:45.328260 kubelet[1952]: W0514 00:47:45.328252 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:45.328260 kubelet[1952]: E0514 00:47:45.328271 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:45.328479 kubelet[1952]: E0514 00:47:45.328464 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:45.328529 kubelet[1952]: W0514 00:47:45.328475 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:45.328529 kubelet[1952]: E0514 00:47:45.328519 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:45.328680 kubelet[1952]: E0514 00:47:45.328667 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:45.328680 kubelet[1952]: W0514 00:47:45.328678 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:45.328740 kubelet[1952]: E0514 00:47:45.328686 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:45.328840 kubelet[1952]: E0514 00:47:45.328823 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:45.328840 kubelet[1952]: W0514 00:47:45.328839 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:45.328892 kubelet[1952]: E0514 00:47:45.328847 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:45.329028 kubelet[1952]: E0514 00:47:45.329003 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:45.329028 kubelet[1952]: W0514 00:47:45.329016 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:45.329028 kubelet[1952]: E0514 00:47:45.329025 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:45.677633 kubelet[1952]: E0514 00:47:45.677590 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9mq7g" podUID="c9b4d85b-ed70-4abb-84fe-dbae253e2eb2" May 14 00:47:45.708127 kubelet[1952]: E0514 00:47:45.708101 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:45.731751 kubelet[1952]: E0514 00:47:45.731720 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:45.731924 kubelet[1952]: W0514 00:47:45.731905 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:45.731999 kubelet[1952]: E0514 00:47:45.731983 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:45.732252 kubelet[1952]: E0514 00:47:45.732237 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:45.732328 kubelet[1952]: W0514 00:47:45.732314 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:45.732431 kubelet[1952]: E0514 00:47:45.732417 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:45.732702 kubelet[1952]: E0514 00:47:45.732685 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:45.732791 kubelet[1952]: W0514 00:47:45.732777 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:45.732856 kubelet[1952]: E0514 00:47:45.732843 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:45.733095 kubelet[1952]: E0514 00:47:45.733080 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:45.733175 kubelet[1952]: W0514 00:47:45.733162 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:45.733249 kubelet[1952]: E0514 00:47:45.733233 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:45.733513 kubelet[1952]: E0514 00:47:45.733499 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:45.733620 kubelet[1952]: W0514 00:47:45.733603 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:45.733684 kubelet[1952]: E0514 00:47:45.733673 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:45.867500 env[1212]: time="2025-05-14T00:47:45.867456613Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:45.868847 env[1212]: time="2025-05-14T00:47:45.868818201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:45.874268 env[1212]: time="2025-05-14T00:47:45.874231350Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:45.875905 env[1212]: time="2025-05-14T00:47:45.875879938Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:45.876363 env[1212]: time="2025-05-14T00:47:45.876335882Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 14 00:47:45.879497 env[1212]: time="2025-05-14T00:47:45.877554490Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 14 00:47:45.889307 env[1212]: time="2025-05-14T00:47:45.889259590Z" level=info msg="CreateContainer within sandbox \"9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 14 00:47:45.901359 env[1212]: time="2025-05-14T00:47:45.901311578Z" level=info msg="CreateContainer within sandbox \"9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\"" May 14 00:47:45.902158 env[1212]: time="2025-05-14T00:47:45.902110849Z" level=info msg="StartContainer for \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\"" May 14 00:47:45.916847 systemd[1]: Started cri-containerd-f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71.scope. May 14 00:47:45.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit: BPF prog-id=126 op=LOAD May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2360 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:45.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638613335323439326430646237616663656335383134633137636261 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2360 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:45.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638613335323439326430646237616663656335383134633137636261 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit: BPF prog-id=127 op=LOAD May 14 00:47:45.962000 audit[2492]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2360 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:45.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638613335323439326430646237616663656335383134633137636261 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit: BPF prog-id=128 op=LOAD May 14 00:47:45.962000 audit[2492]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2360 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:45.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638613335323439326430646237616663656335383134633137636261 May 14 00:47:45.962000 audit: BPF prog-id=128 op=UNLOAD May 14 00:47:45.962000 audit: BPF prog-id=127 op=UNLOAD May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:45.962000 audit: BPF prog-id=129 op=LOAD May 14 00:47:45.962000 audit[2492]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2360 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:45.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638613335323439326430646237616663656335383134633137636261 May 14 00:47:45.983282 env[1212]: time="2025-05-14T00:47:45.983238196Z" level=info msg="StartContainer for \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\" returns successfully" May 14 00:47:46.710211 kubelet[1952]: E0514 00:47:46.710116 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:46.720506 kubelet[1952]: I0514 00:47:46.720257 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-85cbb9c569-d8vsh" podStartSLOduration=2.066373117 podStartE2EDuration="3.720242688s" podCreationTimestamp="2025-05-14 00:47:43 +0000 UTC" firstStartedPulling="2025-05-14 00:47:44.223323429 +0000 UTC m=+12.640461674" lastFinishedPulling="2025-05-14 00:47:45.87719304 +0000 UTC m=+14.294331245" observedRunningTime="2025-05-14 00:47:46.7195782 +0000 UTC m=+15.136716445" watchObservedRunningTime="2025-05-14 00:47:46.720242688 +0000 UTC m=+15.137380933" May 14 00:47:46.742332 kubelet[1952]: E0514 00:47:46.742310 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.742552 kubelet[1952]: W0514 00:47:46.742480 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.743616 kubelet[1952]: E0514 00:47:46.743590 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.743886 kubelet[1952]: E0514 00:47:46.743868 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.743963 kubelet[1952]: W0514 00:47:46.743949 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.744032 kubelet[1952]: E0514 00:47:46.744019 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.744252 kubelet[1952]: E0514 00:47:46.744239 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.744326 kubelet[1952]: W0514 00:47:46.744314 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.744382 kubelet[1952]: E0514 00:47:46.744371 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.744617 kubelet[1952]: E0514 00:47:46.744604 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.744690 kubelet[1952]: W0514 00:47:46.744678 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.744760 kubelet[1952]: E0514 00:47:46.744748 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.744978 kubelet[1952]: E0514 00:47:46.744965 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.745052 kubelet[1952]: W0514 00:47:46.745040 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.745112 kubelet[1952]: E0514 00:47:46.745100 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.745313 kubelet[1952]: E0514 00:47:46.745300 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.745378 kubelet[1952]: W0514 00:47:46.745366 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.745459 kubelet[1952]: E0514 00:47:46.745445 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.745672 kubelet[1952]: E0514 00:47:46.745659 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.745757 kubelet[1952]: W0514 00:47:46.745744 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.745811 kubelet[1952]: E0514 00:47:46.745800 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.746022 kubelet[1952]: E0514 00:47:46.746009 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.746106 kubelet[1952]: W0514 00:47:46.746094 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.746164 kubelet[1952]: E0514 00:47:46.746152 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.746381 kubelet[1952]: E0514 00:47:46.746368 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.746478 kubelet[1952]: W0514 00:47:46.746463 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.746535 kubelet[1952]: E0514 00:47:46.746525 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.746750 kubelet[1952]: E0514 00:47:46.746735 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.746816 kubelet[1952]: W0514 00:47:46.746804 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.746872 kubelet[1952]: E0514 00:47:46.746861 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.747084 kubelet[1952]: E0514 00:47:46.747071 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.747156 kubelet[1952]: W0514 00:47:46.747145 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.747209 kubelet[1952]: E0514 00:47:46.747198 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.747423 kubelet[1952]: E0514 00:47:46.747411 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.747501 kubelet[1952]: W0514 00:47:46.747488 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.747557 kubelet[1952]: E0514 00:47:46.747546 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.747780 kubelet[1952]: E0514 00:47:46.747767 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.747856 kubelet[1952]: W0514 00:47:46.747843 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.747908 kubelet[1952]: E0514 00:47:46.747898 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.748122 kubelet[1952]: E0514 00:47:46.748109 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.748191 kubelet[1952]: W0514 00:47:46.748181 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.748256 kubelet[1952]: E0514 00:47:46.748244 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.748471 kubelet[1952]: E0514 00:47:46.748455 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.748537 kubelet[1952]: W0514 00:47:46.748525 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.748591 kubelet[1952]: E0514 00:47:46.748579 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.765810 kubelet[1952]: E0514 00:47:46.765792 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.765810 kubelet[1952]: W0514 00:47:46.765808 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.765928 kubelet[1952]: E0514 00:47:46.765821 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.766111 kubelet[1952]: E0514 00:47:46.766095 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.766111 kubelet[1952]: W0514 00:47:46.766107 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.766181 kubelet[1952]: E0514 00:47:46.766116 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.766318 kubelet[1952]: E0514 00:47:46.766305 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.766318 kubelet[1952]: W0514 00:47:46.766317 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.766383 kubelet[1952]: E0514 00:47:46.766326 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.766888 kubelet[1952]: E0514 00:47:46.766875 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.766888 kubelet[1952]: W0514 00:47:46.766887 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.766958 kubelet[1952]: E0514 00:47:46.766903 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.767064 kubelet[1952]: E0514 00:47:46.767054 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.767064 kubelet[1952]: W0514 00:47:46.767064 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.767127 kubelet[1952]: E0514 00:47:46.767077 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.767224 kubelet[1952]: E0514 00:47:46.767206 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.767224 kubelet[1952]: W0514 00:47:46.767217 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.767277 kubelet[1952]: E0514 00:47:46.767228 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.768074 kubelet[1952]: E0514 00:47:46.768056 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.768074 kubelet[1952]: W0514 00:47:46.768070 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.768200 kubelet[1952]: E0514 00:47:46.768178 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.768561 kubelet[1952]: E0514 00:47:46.768228 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.768646 kubelet[1952]: W0514 00:47:46.768632 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.768811 kubelet[1952]: E0514 00:47:46.768784 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.769024 kubelet[1952]: E0514 00:47:46.769009 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.769100 kubelet[1952]: W0514 00:47:46.769087 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.769212 kubelet[1952]: E0514 00:47:46.769192 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.769371 kubelet[1952]: E0514 00:47:46.769359 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.769475 kubelet[1952]: W0514 00:47:46.769461 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.769546 kubelet[1952]: E0514 00:47:46.769534 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.769778 kubelet[1952]: E0514 00:47:46.769764 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.769890 kubelet[1952]: W0514 00:47:46.769877 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.769953 kubelet[1952]: E0514 00:47:46.769942 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.770184 kubelet[1952]: E0514 00:47:46.770171 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.770253 kubelet[1952]: W0514 00:47:46.770241 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.770309 kubelet[1952]: E0514 00:47:46.770297 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.770553 kubelet[1952]: E0514 00:47:46.770539 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.770621 kubelet[1952]: W0514 00:47:46.770610 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.770750 kubelet[1952]: E0514 00:47:46.770722 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.770864 kubelet[1952]: E0514 00:47:46.770851 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.770925 kubelet[1952]: W0514 00:47:46.770914 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.770984 kubelet[1952]: E0514 00:47:46.770972 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.771227 kubelet[1952]: E0514 00:47:46.771213 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.771307 kubelet[1952]: W0514 00:47:46.771293 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.771363 kubelet[1952]: E0514 00:47:46.771352 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.771624 kubelet[1952]: E0514 00:47:46.771611 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.771716 kubelet[1952]: W0514 00:47:46.771692 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.771792 kubelet[1952]: E0514 00:47:46.771778 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.772008 kubelet[1952]: E0514 00:47:46.771982 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.772008 kubelet[1952]: W0514 00:47:46.771997 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.772008 kubelet[1952]: E0514 00:47:46.772008 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.772306 kubelet[1952]: E0514 00:47:46.772293 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:47:46.772383 kubelet[1952]: W0514 00:47:46.772370 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:47:46.772485 kubelet[1952]: E0514 00:47:46.772472 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:47:46.916573 env[1212]: time="2025-05-14T00:47:46.916511773Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:46.918363 env[1212]: time="2025-05-14T00:47:46.918325492Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:46.919752 env[1212]: time="2025-05-14T00:47:46.919714035Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:46.920998 env[1212]: time="2025-05-14T00:47:46.920968880Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:46.921518 env[1212]: time="2025-05-14T00:47:46.921486988Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 14 00:47:46.923669 env[1212]: time="2025-05-14T00:47:46.923639312Z" level=info msg="CreateContainer within sandbox \"7e4439a8ed3f756be2ee5b464027ff6c024a8e37452e25220166baecac71155f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 14 00:47:46.935482 env[1212]: time="2025-05-14T00:47:46.935441986Z" level=info msg="CreateContainer within sandbox \"7e4439a8ed3f756be2ee5b464027ff6c024a8e37452e25220166baecac71155f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f449dff8489671eaa253bc91047ca1a43749b49ed5655001be4c8154c171392f\"" May 14 00:47:46.938355 env[1212]: time="2025-05-14T00:47:46.938317845Z" level=info msg="StartContainer for \"f449dff8489671eaa253bc91047ca1a43749b49ed5655001be4c8154c171392f\"" May 14 00:47:46.967537 systemd[1]: run-containerd-runc-k8s.io-f449dff8489671eaa253bc91047ca1a43749b49ed5655001be4c8154c171392f-runc.FlP8oI.mount: Deactivated successfully. May 14 00:47:46.976610 systemd[1]: Started cri-containerd-f449dff8489671eaa253bc91047ca1a43749b49ed5655001be4c8154c171392f.scope. May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2423 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:46.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634343964666638343839363731656161323533626339313034376361 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit: BPF prog-id=130 op=LOAD May 14 00:47:46.999000 audit[2564]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2423 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:46.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634343964666638343839363731656161323533626339313034376361 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit: BPF prog-id=131 op=LOAD May 14 00:47:46.999000 audit[2564]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2423 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:46.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634343964666638343839363731656161323533626339313034376361 May 14 00:47:46.999000 audit: BPF prog-id=131 op=UNLOAD May 14 00:47:46.999000 audit: BPF prog-id=130 op=UNLOAD May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:46.999000 audit: BPF prog-id=132 op=LOAD May 14 00:47:46.999000 audit[2564]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2423 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:46.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634343964666638343839363731656161323533626339313034376361 May 14 00:47:47.022297 env[1212]: time="2025-05-14T00:47:47.022072458Z" level=info msg="StartContainer for \"f449dff8489671eaa253bc91047ca1a43749b49ed5655001be4c8154c171392f\" returns successfully" May 14 00:47:47.036844 systemd[1]: cri-containerd-f449dff8489671eaa253bc91047ca1a43749b49ed5655001be4c8154c171392f.scope: Deactivated successfully. May 14 00:47:47.041000 audit: BPF prog-id=132 op=UNLOAD May 14 00:47:47.054709 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f449dff8489671eaa253bc91047ca1a43749b49ed5655001be4c8154c171392f-rootfs.mount: Deactivated successfully. May 14 00:47:47.118700 env[1212]: time="2025-05-14T00:47:47.118652928Z" level=info msg="shim disconnected" id=f449dff8489671eaa253bc91047ca1a43749b49ed5655001be4c8154c171392f May 14 00:47:47.118700 env[1212]: time="2025-05-14T00:47:47.118699174Z" level=warning msg="cleaning up after shim disconnected" id=f449dff8489671eaa253bc91047ca1a43749b49ed5655001be4c8154c171392f namespace=k8s.io May 14 00:47:47.118700 env[1212]: time="2025-05-14T00:47:47.118708895Z" level=info msg="cleaning up dead shim" May 14 00:47:47.125320 env[1212]: time="2025-05-14T00:47:47.125274999Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:47:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2604 runtime=io.containerd.runc.v2\n" May 14 00:47:47.677150 kubelet[1952]: E0514 00:47:47.676756 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9mq7g" podUID="c9b4d85b-ed70-4abb-84fe-dbae253e2eb2" May 14 00:47:47.713169 kubelet[1952]: E0514 00:47:47.713139 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:47.714225 env[1212]: time="2025-05-14T00:47:47.714191407Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 14 00:47:47.714617 kubelet[1952]: I0514 00:47:47.714593 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:47:47.714917 kubelet[1952]: E0514 00:47:47.714887 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:49.679458 kubelet[1952]: E0514 00:47:49.679359 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9mq7g" podUID="c9b4d85b-ed70-4abb-84fe-dbae253e2eb2" May 14 00:47:51.148955 env[1212]: time="2025-05-14T00:47:51.148892538Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:51.150781 env[1212]: time="2025-05-14T00:47:51.150746371Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:51.152299 env[1212]: time="2025-05-14T00:47:51.152261568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:51.153984 env[1212]: time="2025-05-14T00:47:51.153951104Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:51.154531 env[1212]: time="2025-05-14T00:47:51.154498201Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 14 00:47:51.159731 env[1212]: time="2025-05-14T00:47:51.159697381Z" level=info msg="CreateContainer within sandbox \"7e4439a8ed3f756be2ee5b464027ff6c024a8e37452e25220166baecac71155f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 14 00:47:51.175321 env[1212]: time="2025-05-14T00:47:51.175242717Z" level=info msg="CreateContainer within sandbox \"7e4439a8ed3f756be2ee5b464027ff6c024a8e37452e25220166baecac71155f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"28f55d53ca9db805704ebf294ebe17dfcece021a0685f854cb2c9e4910310a8f\"" May 14 00:47:51.176066 env[1212]: time="2025-05-14T00:47:51.176028719Z" level=info msg="StartContainer for \"28f55d53ca9db805704ebf294ebe17dfcece021a0685f854cb2c9e4910310a8f\"" May 14 00:47:51.194502 systemd[1]: Started cri-containerd-28f55d53ca9db805704ebf294ebe17dfcece021a0685f854cb2c9e4910310a8f.scope. May 14 00:47:51.212000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.214896 kernel: kauditd_printk_skb: 223 callbacks suppressed May 14 00:47:51.214964 kernel: audit: type=1400 audit(1747183671.212:996): avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.212000 audit[2629]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2423 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:51.221190 kernel: audit: type=1300 audit(1747183671.212:996): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2423 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:51.221244 kernel: audit: type=1327 audit(1747183671.212:996): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238663535643533636139646238303537303465626632393465626531 May 14 00:47:51.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238663535643533636139646238303537303465626632393465626531 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.227008 kernel: audit: type=1400 audit(1747183671.213:997): avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.227064 kernel: audit: type=1400 audit(1747183671.213:997): avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.231707 kernel: audit: type=1400 audit(1747183671.213:997): avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.231780 kernel: audit: type=1400 audit(1747183671.213:997): avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.236555 kernel: audit: type=1400 audit(1747183671.213:997): avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.239231 kernel: audit: type=1400 audit(1747183671.213:997): avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.239297 kernel: audit: type=1400 audit(1747183671.213:997): avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit: BPF prog-id=133 op=LOAD May 14 00:47:51.213000 audit[2629]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2423 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:51.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238663535643533636139646238303537303465626632393465626531 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.213000 audit: BPF prog-id=134 op=LOAD May 14 00:47:51.213000 audit[2629]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2423 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:51.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238663535643533636139646238303537303465626632393465626531 May 14 00:47:51.216000 audit: BPF prog-id=134 op=UNLOAD May 14 00:47:51.216000 audit: BPF prog-id=133 op=UNLOAD May 14 00:47:51.216000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.216000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.216000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.216000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.216000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.216000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.216000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.216000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.216000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.216000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:51.216000 audit: BPF prog-id=135 op=LOAD May 14 00:47:51.216000 audit[2629]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2423 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:51.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238663535643533636139646238303537303465626632393465626531 May 14 00:47:51.243131 env[1212]: time="2025-05-14T00:47:51.243091569Z" level=info msg="StartContainer for \"28f55d53ca9db805704ebf294ebe17dfcece021a0685f854cb2c9e4910310a8f\" returns successfully" May 14 00:47:51.677367 kubelet[1952]: E0514 00:47:51.677307 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9mq7g" podUID="c9b4d85b-ed70-4abb-84fe-dbae253e2eb2" May 14 00:47:51.729727 kubelet[1952]: E0514 00:47:51.729689 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:51.868901 env[1212]: time="2025-05-14T00:47:51.868846805Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 14 00:47:51.870919 systemd[1]: cri-containerd-28f55d53ca9db805704ebf294ebe17dfcece021a0685f854cb2c9e4910310a8f.scope: Deactivated successfully. May 14 00:47:51.873000 audit: BPF prog-id=135 op=UNLOAD May 14 00:47:51.911090 env[1212]: time="2025-05-14T00:47:51.911040750Z" level=info msg="shim disconnected" id=28f55d53ca9db805704ebf294ebe17dfcece021a0685f854cb2c9e4910310a8f May 14 00:47:51.911090 env[1212]: time="2025-05-14T00:47:51.911089435Z" level=warning msg="cleaning up after shim disconnected" id=28f55d53ca9db805704ebf294ebe17dfcece021a0685f854cb2c9e4910310a8f namespace=k8s.io May 14 00:47:51.911435 env[1212]: time="2025-05-14T00:47:51.911099196Z" level=info msg="cleaning up dead shim" May 14 00:47:51.917604 env[1212]: time="2025-05-14T00:47:51.917554427Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:47:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2672 runtime=io.containerd.runc.v2\n" May 14 00:47:51.963470 kubelet[1952]: I0514 00:47:51.963363 1952 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 14 00:47:51.987818 kubelet[1952]: W0514 00:47:51.987786 1952 reflector.go:569] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object May 14 00:47:51.989120 kubelet[1952]: E0514 00:47:51.989089 1952 reflector.go:166] "Unhandled Error" err="object-\"kube-system\"/\"coredns\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"coredns\" is forbidden: User \"system:node:localhost\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'localhost' and this object" logger="UnhandledError" May 14 00:47:51.993022 systemd[1]: Created slice kubepods-besteffort-podf27fc4b7_dd9e_4481_aeb6_12e6130e42ea.slice. May 14 00:47:51.998822 systemd[1]: Created slice kubepods-burstable-pod427b275f_8795_4674_81ba_05adaf2dfdcc.slice. May 14 00:47:52.006017 systemd[1]: Created slice kubepods-besteffort-podc82c1ca9_af53_4961_9e06_6c41aa4edf49.slice. May 14 00:47:52.011815 systemd[1]: Created slice kubepods-burstable-pod62cca936_2867_4a1c_90ed_75f701fd8645.slice. May 14 00:47:52.017161 systemd[1]: Created slice kubepods-besteffort-pod01c5ffd5_98f0_41f4_ac02_cee91eb6a543.slice. May 14 00:47:52.024344 systemd[1]: Created slice kubepods-besteffort-pod07c3c723_015f_4039_b023_092360f2960b.slice. May 14 00:47:52.040322 kubelet[1952]: I0514 00:47:52.040291 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qlq7h\" (UniqueName: \"kubernetes.io/projected/f27fc4b7-dd9e-4481-aeb6-12e6130e42ea-kube-api-access-qlq7h\") pod \"calico-apiserver-5c856d6799-4t4bd\" (UID: \"f27fc4b7-dd9e-4481-aeb6-12e6130e42ea\") " pod="calico-apiserver/calico-apiserver-5c856d6799-4t4bd" May 14 00:47:52.040527 kubelet[1952]: I0514 00:47:52.040507 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/62cca936-2867-4a1c-90ed-75f701fd8645-config-volume\") pod \"coredns-668d6bf9bc-7fmr6\" (UID: \"62cca936-2867-4a1c-90ed-75f701fd8645\") " pod="kube-system/coredns-668d6bf9bc-7fmr6" May 14 00:47:52.040632 kubelet[1952]: I0514 00:47:52.040617 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wkvlc\" (UniqueName: \"kubernetes.io/projected/c82c1ca9-af53-4961-9e06-6c41aa4edf49-kube-api-access-wkvlc\") pod \"calico-kube-controllers-8656ccb584-l42f8\" (UID: \"c82c1ca9-af53-4961-9e06-6c41aa4edf49\") " pod="calico-system/calico-kube-controllers-8656ccb584-l42f8" May 14 00:47:52.040726 kubelet[1952]: I0514 00:47:52.040712 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rkqbd\" (UniqueName: \"kubernetes.io/projected/62cca936-2867-4a1c-90ed-75f701fd8645-kube-api-access-rkqbd\") pod \"coredns-668d6bf9bc-7fmr6\" (UID: \"62cca936-2867-4a1c-90ed-75f701fd8645\") " pod="kube-system/coredns-668d6bf9bc-7fmr6" May 14 00:47:52.040812 kubelet[1952]: I0514 00:47:52.040800 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/427b275f-8795-4674-81ba-05adaf2dfdcc-config-volume\") pod \"coredns-668d6bf9bc-k84nz\" (UID: \"427b275f-8795-4674-81ba-05adaf2dfdcc\") " pod="kube-system/coredns-668d6bf9bc-k84nz" May 14 00:47:52.040952 kubelet[1952]: I0514 00:47:52.040916 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c82c1ca9-af53-4961-9e06-6c41aa4edf49-tigera-ca-bundle\") pod \"calico-kube-controllers-8656ccb584-l42f8\" (UID: \"c82c1ca9-af53-4961-9e06-6c41aa4edf49\") " pod="calico-system/calico-kube-controllers-8656ccb584-l42f8" May 14 00:47:52.041001 kubelet[1952]: I0514 00:47:52.040960 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/01c5ffd5-98f0-41f4-ac02-cee91eb6a543-calico-apiserver-certs\") pod \"calico-apiserver-645b7c96b4-9ffhl\" (UID: \"01c5ffd5-98f0-41f4-ac02-cee91eb6a543\") " pod="calico-apiserver/calico-apiserver-645b7c96b4-9ffhl" May 14 00:47:52.041001 kubelet[1952]: I0514 00:47:52.040979 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z5j94\" (UniqueName: \"kubernetes.io/projected/427b275f-8795-4674-81ba-05adaf2dfdcc-kube-api-access-z5j94\") pod \"coredns-668d6bf9bc-k84nz\" (UID: \"427b275f-8795-4674-81ba-05adaf2dfdcc\") " pod="kube-system/coredns-668d6bf9bc-k84nz" May 14 00:47:52.041001 kubelet[1952]: I0514 00:47:52.040997 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/07c3c723-015f-4039-b023-092360f2960b-calico-apiserver-certs\") pod \"calico-apiserver-645b7c96b4-7lzps\" (UID: \"07c3c723-015f-4039-b023-092360f2960b\") " pod="calico-apiserver/calico-apiserver-645b7c96b4-7lzps" May 14 00:47:52.041078 kubelet[1952]: I0514 00:47:52.041020 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f27fc4b7-dd9e-4481-aeb6-12e6130e42ea-calico-apiserver-certs\") pod \"calico-apiserver-5c856d6799-4t4bd\" (UID: \"f27fc4b7-dd9e-4481-aeb6-12e6130e42ea\") " pod="calico-apiserver/calico-apiserver-5c856d6799-4t4bd" May 14 00:47:52.041078 kubelet[1952]: I0514 00:47:52.041035 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dmnf7\" (UniqueName: \"kubernetes.io/projected/07c3c723-015f-4039-b023-092360f2960b-kube-api-access-dmnf7\") pod \"calico-apiserver-645b7c96b4-7lzps\" (UID: \"07c3c723-015f-4039-b023-092360f2960b\") " pod="calico-apiserver/calico-apiserver-645b7c96b4-7lzps" May 14 00:47:52.041078 kubelet[1952]: I0514 00:47:52.041054 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v8b4d\" (UniqueName: \"kubernetes.io/projected/01c5ffd5-98f0-41f4-ac02-cee91eb6a543-kube-api-access-v8b4d\") pod \"calico-apiserver-645b7c96b4-9ffhl\" (UID: \"01c5ffd5-98f0-41f4-ac02-cee91eb6a543\") " pod="calico-apiserver/calico-apiserver-645b7c96b4-9ffhl" May 14 00:47:52.179168 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-28f55d53ca9db805704ebf294ebe17dfcece021a0685f854cb2c9e4910310a8f-rootfs.mount: Deactivated successfully. May 14 00:47:52.296894 env[1212]: time="2025-05-14T00:47:52.296771815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c856d6799-4t4bd,Uid:f27fc4b7-dd9e-4481-aeb6-12e6130e42ea,Namespace:calico-apiserver,Attempt:0,}" May 14 00:47:52.309612 env[1212]: time="2025-05-14T00:47:52.309568806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8656ccb584-l42f8,Uid:c82c1ca9-af53-4961-9e06-6c41aa4edf49,Namespace:calico-system,Attempt:0,}" May 14 00:47:52.320362 env[1212]: time="2025-05-14T00:47:52.320321235Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-645b7c96b4-9ffhl,Uid:01c5ffd5-98f0-41f4-ac02-cee91eb6a543,Namespace:calico-apiserver,Attempt:0,}" May 14 00:47:52.327773 env[1212]: time="2025-05-14T00:47:52.327723771Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-645b7c96b4-7lzps,Uid:07c3c723-015f-4039-b023-092360f2960b,Namespace:calico-apiserver,Attempt:0,}" May 14 00:47:52.610138 env[1212]: time="2025-05-14T00:47:52.610062189Z" level=error msg="Failed to destroy network for sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.610580 env[1212]: time="2025-05-14T00:47:52.610546837Z" level=error msg="encountered an error cleaning up failed sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.610654 env[1212]: time="2025-05-14T00:47:52.610597642Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c856d6799-4t4bd,Uid:f27fc4b7-dd9e-4481-aeb6-12e6130e42ea,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.611569 kubelet[1952]: E0514 00:47:52.611526 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.612867 kubelet[1952]: E0514 00:47:52.612829 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c856d6799-4t4bd" May 14 00:47:52.612867 kubelet[1952]: E0514 00:47:52.612869 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c856d6799-4t4bd" May 14 00:47:52.613071 kubelet[1952]: E0514 00:47:52.612916 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5c856d6799-4t4bd_calico-apiserver(f27fc4b7-dd9e-4481-aeb6-12e6130e42ea)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5c856d6799-4t4bd_calico-apiserver(f27fc4b7-dd9e-4481-aeb6-12e6130e42ea)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c856d6799-4t4bd" podUID="f27fc4b7-dd9e-4481-aeb6-12e6130e42ea" May 14 00:47:52.614028 env[1212]: time="2025-05-14T00:47:52.613990699Z" level=error msg="Failed to destroy network for sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.614464 env[1212]: time="2025-05-14T00:47:52.614428102Z" level=error msg="encountered an error cleaning up failed sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.614602 env[1212]: time="2025-05-14T00:47:52.614572757Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-645b7c96b4-7lzps,Uid:07c3c723-015f-4039-b023-092360f2960b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.614865 kubelet[1952]: E0514 00:47:52.614838 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.614924 kubelet[1952]: E0514 00:47:52.614877 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-645b7c96b4-7lzps" May 14 00:47:52.614924 kubelet[1952]: E0514 00:47:52.614893 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-645b7c96b4-7lzps" May 14 00:47:52.614980 kubelet[1952]: E0514 00:47:52.614920 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-645b7c96b4-7lzps_calico-apiserver(07c3c723-015f-4039-b023-092360f2960b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-645b7c96b4-7lzps_calico-apiserver(07c3c723-015f-4039-b023-092360f2960b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-645b7c96b4-7lzps" podUID="07c3c723-015f-4039-b023-092360f2960b" May 14 00:47:52.620486 env[1212]: time="2025-05-14T00:47:52.620372653Z" level=error msg="Failed to destroy network for sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.620882 env[1212]: time="2025-05-14T00:47:52.620848060Z" level=error msg="encountered an error cleaning up failed sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.621011 env[1212]: time="2025-05-14T00:47:52.620974993Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-645b7c96b4-9ffhl,Uid:01c5ffd5-98f0-41f4-ac02-cee91eb6a543,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.621266 kubelet[1952]: E0514 00:47:52.621236 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.621332 kubelet[1952]: E0514 00:47:52.621278 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-645b7c96b4-9ffhl" May 14 00:47:52.621332 kubelet[1952]: E0514 00:47:52.621296 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-645b7c96b4-9ffhl" May 14 00:47:52.621400 kubelet[1952]: E0514 00:47:52.621325 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-645b7c96b4-9ffhl_calico-apiserver(01c5ffd5-98f0-41f4-ac02-cee91eb6a543)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-645b7c96b4-9ffhl_calico-apiserver(01c5ffd5-98f0-41f4-ac02-cee91eb6a543)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-645b7c96b4-9ffhl" podUID="01c5ffd5-98f0-41f4-ac02-cee91eb6a543" May 14 00:47:52.628129 env[1212]: time="2025-05-14T00:47:52.628063057Z" level=error msg="Failed to destroy network for sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.628623 env[1212]: time="2025-05-14T00:47:52.628587350Z" level=error msg="encountered an error cleaning up failed sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.628760 env[1212]: time="2025-05-14T00:47:52.628731324Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8656ccb584-l42f8,Uid:c82c1ca9-af53-4961-9e06-6c41aa4edf49,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.629033 kubelet[1952]: E0514 00:47:52.628985 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.629097 kubelet[1952]: E0514 00:47:52.629034 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8656ccb584-l42f8" May 14 00:47:52.629097 kubelet[1952]: E0514 00:47:52.629051 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8656ccb584-l42f8" May 14 00:47:52.629097 kubelet[1952]: E0514 00:47:52.629080 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-8656ccb584-l42f8_calico-system(c82c1ca9-af53-4961-9e06-6c41aa4edf49)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-8656ccb584-l42f8_calico-system(c82c1ca9-af53-4961-9e06-6c41aa4edf49)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8656ccb584-l42f8" podUID="c82c1ca9-af53-4961-9e06-6c41aa4edf49" May 14 00:47:52.731912 kubelet[1952]: I0514 00:47:52.731882 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:47:52.732677 env[1212]: time="2025-05-14T00:47:52.732640810Z" level=info msg="StopPodSandbox for \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\"" May 14 00:47:52.734647 kubelet[1952]: E0514 00:47:52.734624 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:52.735211 kubelet[1952]: I0514 00:47:52.735195 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:47:52.735250 env[1212]: time="2025-05-14T00:47:52.735217906Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 14 00:47:52.736278 env[1212]: time="2025-05-14T00:47:52.736220206Z" level=info msg="StopPodSandbox for \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\"" May 14 00:47:52.738440 kubelet[1952]: I0514 00:47:52.737787 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:47:52.738524 env[1212]: time="2025-05-14T00:47:52.738130396Z" level=info msg="StopPodSandbox for \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\"" May 14 00:47:52.740008 kubelet[1952]: I0514 00:47:52.739982 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:47:52.740384 env[1212]: time="2025-05-14T00:47:52.740357817Z" level=info msg="StopPodSandbox for \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\"" May 14 00:47:52.780204 env[1212]: time="2025-05-14T00:47:52.780147931Z" level=error msg="StopPodSandbox for \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\" failed" error="failed to destroy network for sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.780686 kubelet[1952]: E0514 00:47:52.780637 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:47:52.780787 kubelet[1952]: E0514 00:47:52.780722 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e"} May 14 00:47:52.780827 kubelet[1952]: E0514 00:47:52.780795 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f27fc4b7-dd9e-4481-aeb6-12e6130e42ea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:47:52.780827 kubelet[1952]: E0514 00:47:52.780817 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f27fc4b7-dd9e-4481-aeb6-12e6130e42ea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c856d6799-4t4bd" podUID="f27fc4b7-dd9e-4481-aeb6-12e6130e42ea" May 14 00:47:52.781496 env[1212]: time="2025-05-14T00:47:52.781458302Z" level=error msg="StopPodSandbox for \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\" failed" error="failed to destroy network for sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.781670 kubelet[1952]: E0514 00:47:52.781639 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:47:52.781709 kubelet[1952]: E0514 00:47:52.781677 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50"} May 14 00:47:52.781737 kubelet[1952]: E0514 00:47:52.781705 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c82c1ca9-af53-4961-9e06-6c41aa4edf49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:47:52.781737 kubelet[1952]: E0514 00:47:52.781723 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c82c1ca9-af53-4961-9e06-6c41aa4edf49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8656ccb584-l42f8" podUID="c82c1ca9-af53-4961-9e06-6c41aa4edf49" May 14 00:47:52.795806 env[1212]: time="2025-05-14T00:47:52.795753322Z" level=error msg="StopPodSandbox for \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\" failed" error="failed to destroy network for sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.796344 kubelet[1952]: E0514 00:47:52.796295 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:47:52.796344 kubelet[1952]: E0514 00:47:52.796344 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7"} May 14 00:47:52.796480 kubelet[1952]: E0514 00:47:52.796387 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"07c3c723-015f-4039-b023-092360f2960b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:47:52.796480 kubelet[1952]: E0514 00:47:52.796421 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"07c3c723-015f-4039-b023-092360f2960b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-645b7c96b4-7lzps" podUID="07c3c723-015f-4039-b023-092360f2960b" May 14 00:47:52.796568 env[1212]: time="2025-05-14T00:47:52.796456512Z" level=error msg="StopPodSandbox for \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\" failed" error="failed to destroy network for sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:52.796628 kubelet[1952]: E0514 00:47:52.796598 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:47:52.796664 kubelet[1952]: E0514 00:47:52.796627 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5"} May 14 00:47:52.796664 kubelet[1952]: E0514 00:47:52.796649 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"01c5ffd5-98f0-41f4-ac02-cee91eb6a543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:47:52.796740 kubelet[1952]: E0514 00:47:52.796665 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"01c5ffd5-98f0-41f4-ac02-cee91eb6a543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-645b7c96b4-9ffhl" podUID="01c5ffd5-98f0-41f4-ac02-cee91eb6a543" May 14 00:47:53.142897 kubelet[1952]: E0514 00:47:53.142844 1952 configmap.go:193] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition May 14 00:47:53.143060 kubelet[1952]: E0514 00:47:53.142936 1952 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/427b275f-8795-4674-81ba-05adaf2dfdcc-config-volume podName:427b275f-8795-4674-81ba-05adaf2dfdcc nodeName:}" failed. No retries permitted until 2025-05-14 00:47:53.642917538 +0000 UTC m=+22.060055783 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/427b275f-8795-4674-81ba-05adaf2dfdcc-config-volume") pod "coredns-668d6bf9bc-k84nz" (UID: "427b275f-8795-4674-81ba-05adaf2dfdcc") : failed to sync configmap cache: timed out waiting for the condition May 14 00:47:53.143137 kubelet[1952]: E0514 00:47:53.143129 1952 configmap.go:193] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition May 14 00:47:53.143181 kubelet[1952]: E0514 00:47:53.143159 1952 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/62cca936-2867-4a1c-90ed-75f701fd8645-config-volume podName:62cca936-2867-4a1c-90ed-75f701fd8645 nodeName:}" failed. No retries permitted until 2025-05-14 00:47:53.6431508 +0000 UTC m=+22.060289045 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/62cca936-2867-4a1c-90ed-75f701fd8645-config-volume") pod "coredns-668d6bf9bc-7fmr6" (UID: "62cca936-2867-4a1c-90ed-75f701fd8645") : failed to sync configmap cache: timed out waiting for the condition May 14 00:47:53.173429 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50-shm.mount: Deactivated successfully. May 14 00:47:53.173528 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5-shm.mount: Deactivated successfully. May 14 00:47:53.173580 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e-shm.mount: Deactivated successfully. May 14 00:47:53.683017 systemd[1]: Created slice kubepods-besteffort-podc9b4d85b_ed70_4abb_84fe_dbae253e2eb2.slice. May 14 00:47:53.685187 env[1212]: time="2025-05-14T00:47:53.685150629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9mq7g,Uid:c9b4d85b-ed70-4abb-84fe-dbae253e2eb2,Namespace:calico-system,Attempt:0,}" May 14 00:47:53.737597 env[1212]: time="2025-05-14T00:47:53.737521770Z" level=error msg="Failed to destroy network for sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.740674 env[1212]: time="2025-05-14T00:47:53.737854801Z" level=error msg="encountered an error cleaning up failed sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.740674 env[1212]: time="2025-05-14T00:47:53.737899205Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9mq7g,Uid:c9b4d85b-ed70-4abb-84fe-dbae253e2eb2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.739428 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c-shm.mount: Deactivated successfully. May 14 00:47:53.740855 kubelet[1952]: E0514 00:47:53.738516 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.740855 kubelet[1952]: E0514 00:47:53.738579 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9mq7g" May 14 00:47:53.740855 kubelet[1952]: E0514 00:47:53.738597 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9mq7g" May 14 00:47:53.741097 kubelet[1952]: E0514 00:47:53.738638 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9mq7g_calico-system(c9b4d85b-ed70-4abb-84fe-dbae253e2eb2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9mq7g_calico-system(c9b4d85b-ed70-4abb-84fe-dbae253e2eb2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9mq7g" podUID="c9b4d85b-ed70-4abb-84fe-dbae253e2eb2" May 14 00:47:53.743010 kubelet[1952]: I0514 00:47:53.742338 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:47:53.743101 env[1212]: time="2025-05-14T00:47:53.742824394Z" level=info msg="StopPodSandbox for \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\"" May 14 00:47:53.772546 env[1212]: time="2025-05-14T00:47:53.772472214Z" level=error msg="StopPodSandbox for \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\" failed" error="failed to destroy network for sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.772727 kubelet[1952]: E0514 00:47:53.772693 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:47:53.772786 kubelet[1952]: E0514 00:47:53.772740 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c"} May 14 00:47:53.772786 kubelet[1952]: E0514 00:47:53.772776 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c9b4d85b-ed70-4abb-84fe-dbae253e2eb2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:47:53.772872 kubelet[1952]: E0514 00:47:53.772795 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c9b4d85b-ed70-4abb-84fe-dbae253e2eb2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9mq7g" podUID="c9b4d85b-ed70-4abb-84fe-dbae253e2eb2" May 14 00:47:53.802461 kubelet[1952]: E0514 00:47:53.802050 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:53.802876 env[1212]: time="2025-05-14T00:47:53.802843582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-k84nz,Uid:427b275f-8795-4674-81ba-05adaf2dfdcc,Namespace:kube-system,Attempt:0,}" May 14 00:47:53.816890 kubelet[1952]: E0514 00:47:53.816626 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:53.817169 env[1212]: time="2025-05-14T00:47:53.817136301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-7fmr6,Uid:62cca936-2867-4a1c-90ed-75f701fd8645,Namespace:kube-system,Attempt:0,}" May 14 00:47:53.874442 env[1212]: time="2025-05-14T00:47:53.874370105Z" level=error msg="Failed to destroy network for sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.874768 env[1212]: time="2025-05-14T00:47:53.874729059Z" level=error msg="encountered an error cleaning up failed sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.874808 env[1212]: time="2025-05-14T00:47:53.874781144Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-k84nz,Uid:427b275f-8795-4674-81ba-05adaf2dfdcc,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.875028 kubelet[1952]: E0514 00:47:53.874996 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.875077 kubelet[1952]: E0514 00:47:53.875052 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-k84nz" May 14 00:47:53.875122 kubelet[1952]: E0514 00:47:53.875073 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-k84nz" May 14 00:47:53.875150 kubelet[1952]: E0514 00:47:53.875122 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-k84nz_kube-system(427b275f-8795-4674-81ba-05adaf2dfdcc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-k84nz_kube-system(427b275f-8795-4674-81ba-05adaf2dfdcc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-k84nz" podUID="427b275f-8795-4674-81ba-05adaf2dfdcc" May 14 00:47:53.886879 env[1212]: time="2025-05-14T00:47:53.886822409Z" level=error msg="Failed to destroy network for sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.887201 env[1212]: time="2025-05-14T00:47:53.887162722Z" level=error msg="encountered an error cleaning up failed sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.887245 env[1212]: time="2025-05-14T00:47:53.887223967Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-7fmr6,Uid:62cca936-2867-4a1c-90ed-75f701fd8645,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.887448 kubelet[1952]: E0514 00:47:53.887417 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:53.887501 kubelet[1952]: E0514 00:47:53.887467 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-7fmr6" May 14 00:47:53.887501 kubelet[1952]: E0514 00:47:53.887486 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-7fmr6" May 14 00:47:53.887558 kubelet[1952]: E0514 00:47:53.887525 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-7fmr6_kube-system(62cca936-2867-4a1c-90ed-75f701fd8645)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-7fmr6_kube-system(62cca936-2867-4a1c-90ed-75f701fd8645)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-7fmr6" podUID="62cca936-2867-4a1c-90ed-75f701fd8645" May 14 00:47:54.173771 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479-shm.mount: Deactivated successfully. May 14 00:47:54.746497 kubelet[1952]: I0514 00:47:54.745945 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:47:54.746842 env[1212]: time="2025-05-14T00:47:54.746623600Z" level=info msg="StopPodSandbox for \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\"" May 14 00:47:54.748536 kubelet[1952]: I0514 00:47:54.748231 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:47:54.748653 env[1212]: time="2025-05-14T00:47:54.748620301Z" level=info msg="StopPodSandbox for \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\"" May 14 00:47:54.782284 env[1212]: time="2025-05-14T00:47:54.782217002Z" level=error msg="StopPodSandbox for \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\" failed" error="failed to destroy network for sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:54.782560 kubelet[1952]: E0514 00:47:54.782521 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:47:54.782634 kubelet[1952]: E0514 00:47:54.782587 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4"} May 14 00:47:54.782634 kubelet[1952]: E0514 00:47:54.782621 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"62cca936-2867-4a1c-90ed-75f701fd8645\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:47:54.782735 kubelet[1952]: E0514 00:47:54.782659 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"62cca936-2867-4a1c-90ed-75f701fd8645\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-7fmr6" podUID="62cca936-2867-4a1c-90ed-75f701fd8645" May 14 00:47:54.788434 env[1212]: time="2025-05-14T00:47:54.788360562Z" level=error msg="StopPodSandbox for \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\" failed" error="failed to destroy network for sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:47:54.788643 kubelet[1952]: E0514 00:47:54.788607 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:47:54.788692 kubelet[1952]: E0514 00:47:54.788657 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479"} May 14 00:47:54.788719 kubelet[1952]: E0514 00:47:54.788695 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"427b275f-8795-4674-81ba-05adaf2dfdcc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:47:54.788776 kubelet[1952]: E0514 00:47:54.788720 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"427b275f-8795-4674-81ba-05adaf2dfdcc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-k84nz" podUID="427b275f-8795-4674-81ba-05adaf2dfdcc" May 14 00:47:57.988162 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4172209415.mount: Deactivated successfully. May 14 00:47:58.140191 env[1212]: time="2025-05-14T00:47:58.140118265Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:58.142002 env[1212]: time="2025-05-14T00:47:58.141965808Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:58.143367 env[1212]: time="2025-05-14T00:47:58.143333874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:58.144840 env[1212]: time="2025-05-14T00:47:58.144812509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:47:58.145191 env[1212]: time="2025-05-14T00:47:58.145162536Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 14 00:47:58.156849 env[1212]: time="2025-05-14T00:47:58.156800357Z" level=info msg="CreateContainer within sandbox \"7e4439a8ed3f756be2ee5b464027ff6c024a8e37452e25220166baecac71155f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 14 00:47:58.172431 env[1212]: time="2025-05-14T00:47:58.172378403Z" level=info msg="CreateContainer within sandbox \"7e4439a8ed3f756be2ee5b464027ff6c024a8e37452e25220166baecac71155f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9a2ea3605ca983473dc85dbfc9702eea6b21996b7734d33b0a90603791c655ed\"" May 14 00:47:58.173182 env[1212]: time="2025-05-14T00:47:58.173142182Z" level=info msg="StartContainer for \"9a2ea3605ca983473dc85dbfc9702eea6b21996b7734d33b0a90603791c655ed\"" May 14 00:47:58.193192 systemd[1]: Started cri-containerd-9a2ea3605ca983473dc85dbfc9702eea6b21996b7734d33b0a90603791c655ed.scope. May 14 00:47:58.234417 kernel: kauditd_printk_skb: 34 callbacks suppressed May 14 00:47:58.234534 kernel: audit: type=1400 audit(1747183678.231:1003): avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.231000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.231000 audit[3143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2423 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:58.238825 kernel: audit: type=1300 audit(1747183678.231:1003): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2423 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:58.238902 kernel: audit: type=1327 audit(1747183678.231:1003): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326561333630356361393833343733646338356462666339373032 May 14 00:47:58.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326561333630356361393833343733646338356462666339373032 May 14 00:47:58.242435 kernel: audit: type=1400 audit(1747183678.233:1004): avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.233000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.233000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.247049 kernel: audit: type=1400 audit(1747183678.233:1004): avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.247118 kernel: audit: type=1400 audit(1747183678.233:1004): avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.233000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.233000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.251683 kernel: audit: type=1400 audit(1747183678.233:1004): avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.251801 kernel: audit: type=1400 audit(1747183678.233:1004): avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.233000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.233000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.256403 kernel: audit: type=1400 audit(1747183678.233:1004): avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.233000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.259119 kernel: audit: type=1400 audit(1747183678.233:1004): avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.233000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.233000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.233000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.233000 audit: BPF prog-id=136 op=LOAD May 14 00:47:58.233000 audit[3143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2423 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:58.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326561333630356361393833343733646338356462666339373032 May 14 00:47:58.234000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.234000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.234000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.234000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.234000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.234000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.234000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.234000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.234000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.234000 audit: BPF prog-id=137 op=LOAD May 14 00:47:58.234000 audit[3143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2423 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:58.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326561333630356361393833343733646338356462666339373032 May 14 00:47:58.238000 audit: BPF prog-id=137 op=UNLOAD May 14 00:47:58.238000 audit: BPF prog-id=136 op=UNLOAD May 14 00:47:58.238000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.238000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.238000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.238000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.238000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.238000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.238000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.238000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.238000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.238000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.238000 audit: BPF prog-id=138 op=LOAD May 14 00:47:58.238000 audit[3143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2423 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:58.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326561333630356361393833343733646338356462666339373032 May 14 00:47:58.260207 env[1212]: time="2025-05-14T00:47:58.259489229Z" level=info msg="StartContainer for \"9a2ea3605ca983473dc85dbfc9702eea6b21996b7734d33b0a90603791c655ed\" returns successfully" May 14 00:47:58.422871 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 14 00:47:58.423022 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 14 00:47:58.760566 kubelet[1952]: E0514 00:47:58.760519 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:47:58.795431 kubelet[1952]: I0514 00:47:58.793692 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-xlnr5" podStartSLOduration=1.9863950780000001 podStartE2EDuration="15.793666637s" podCreationTimestamp="2025-05-14 00:47:43 +0000 UTC" firstStartedPulling="2025-05-14 00:47:44.33896158 +0000 UTC m=+12.756099825" lastFinishedPulling="2025-05-14 00:47:58.146233139 +0000 UTC m=+26.563371384" observedRunningTime="2025-05-14 00:47:58.787476718 +0000 UTC m=+27.204614963" watchObservedRunningTime="2025-05-14 00:47:58.793666637 +0000 UTC m=+27.210804882" May 14 00:47:59.693000 audit[3290]: AVC avc: denied { write } for pid=3290 comm="tee" name="fd" dev="proc" ino=18862 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:47:59.693000 audit[3290]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffb4b2a2a a2=241 a3=1b6 items=1 ppid=3239 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.693000 audit: CWD cwd="/etc/service/enabled/felix/log" May 14 00:47:59.693000 audit: PATH item=0 name="/dev/fd/63" inode=18859 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:47:59.693000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:47:59.696000 audit[3278]: AVC avc: denied { write } for pid=3278 comm="tee" name="fd" dev="proc" ino=18868 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:47:59.696000 audit[3278]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffed631a2a a2=241 a3=1b6 items=1 ppid=3233 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.696000 audit: CWD cwd="/etc/service/enabled/confd/log" May 14 00:47:59.696000 audit: PATH item=0 name="/dev/fd/63" inode=19837 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:47:59.696000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:47:59.699000 audit[3305]: AVC avc: denied { write } for pid=3305 comm="tee" name="fd" dev="proc" ino=18875 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:47:59.699000 audit[3305]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff1973a2c a2=241 a3=1b6 items=1 ppid=3243 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.699000 audit: CWD cwd="/etc/service/enabled/cni/log" May 14 00:47:59.699000 audit: PATH item=0 name="/dev/fd/63" inode=18872 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:47:59.699000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:47:59.700000 audit[3288]: AVC avc: denied { write } for pid=3288 comm="tee" name="fd" dev="proc" ino=19841 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:47:59.700000 audit[3288]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcb100a2b a2=241 a3=1b6 items=1 ppid=3236 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.700000 audit: CWD cwd="/etc/service/enabled/bird/log" May 14 00:47:59.700000 audit: PATH item=0 name="/dev/fd/63" inode=20671 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:47:59.700000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:47:59.704000 audit[3293]: AVC avc: denied { write } for pid=3293 comm="tee" name="fd" dev="proc" ino=19845 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:47:59.704000 audit[3293]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff7b9da2a a2=241 a3=1b6 items=1 ppid=3241 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.704000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 14 00:47:59.704000 audit: PATH item=0 name="/dev/fd/63" inode=19838 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:47:59.704000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:47:59.713000 audit[3301]: AVC avc: denied { write } for pid=3301 comm="tee" name="fd" dev="proc" ino=17787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:47:59.713000 audit[3301]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd8eb8a1a a2=241 a3=1b6 items=1 ppid=3254 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.713000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 14 00:47:59.713000 audit: PATH item=0 name="/dev/fd/63" inode=20672 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:47:59.713000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:47:59.726000 audit[3310]: AVC avc: denied { write } for pid=3310 comm="tee" name="fd" dev="proc" ino=20677 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:47:59.726000 audit[3310]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdc23fa1b a2=241 a3=1b6 items=1 ppid=3235 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.726000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 14 00:47:59.726000 audit: PATH item=0 name="/dev/fd/63" inode=17784 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:47:59.726000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:47:59.762016 kubelet[1952]: E0514 00:47:59.761982 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:00.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.97:22-10.0.0.1:59776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:00.142156 systemd[1]: Started sshd@7-10.0.0.97:22-10.0.0.1:59776.service. May 14 00:48:00.184000 audit[3346]: USER_ACCT pid=3346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:00.185308 sshd[3346]: Accepted publickey for core from 10.0.0.1 port 59776 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:00.185000 audit[3346]: CRED_ACQ pid=3346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:00.186000 audit[3346]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcba2e670 a2=3 a3=1 items=0 ppid=1 pid=3346 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:00.186000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:00.186891 sshd[3346]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:00.191473 systemd-logind[1200]: New session 8 of user core. May 14 00:48:00.192069 systemd[1]: Started session-8.scope. May 14 00:48:00.197000 audit[3346]: USER_START pid=3346 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:00.199000 audit[3348]: CRED_ACQ pid=3348 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:00.363010 sshd[3346]: pam_unix(sshd:session): session closed for user core May 14 00:48:00.364000 audit[3346]: USER_END pid=3346 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:00.364000 audit[3346]: CRED_DISP pid=3346 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:00.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.97:22-10.0.0.1:59776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:00.366072 systemd[1]: sshd@7-10.0.0.97:22-10.0.0.1:59776.service: Deactivated successfully. May 14 00:48:00.366904 systemd[1]: session-8.scope: Deactivated successfully. May 14 00:48:00.367452 systemd-logind[1200]: Session 8 logged out. Waiting for processes to exit. May 14 00:48:00.368131 systemd-logind[1200]: Removed session 8. May 14 00:48:00.764012 kubelet[1952]: E0514 00:48:00.763515 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:03.677833 env[1212]: time="2025-05-14T00:48:03.677204721Z" level=info msg="StopPodSandbox for \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\"" May 14 00:48:03.677833 env[1212]: time="2025-05-14T00:48:03.677604387Z" level=info msg="StopPodSandbox for \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\"" May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.813 [INFO][3487] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.813 [INFO][3487] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" iface="eth0" netns="/var/run/netns/cni-6fa80a26-d3e3-9a0f-dc19-8c04b046a6d6" May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.813 [INFO][3487] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" iface="eth0" netns="/var/run/netns/cni-6fa80a26-d3e3-9a0f-dc19-8c04b046a6d6" May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.814 [INFO][3487] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" iface="eth0" netns="/var/run/netns/cni-6fa80a26-d3e3-9a0f-dc19-8c04b046a6d6" May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.814 [INFO][3487] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.814 [INFO][3487] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.883 [INFO][3508] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" HandleID="k8s-pod-network.1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.883 [INFO][3508] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.883 [INFO][3508] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.893 [WARNING][3508] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" HandleID="k8s-pod-network.1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.893 [INFO][3508] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" HandleID="k8s-pod-network.1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.895 [INFO][3508] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:03.904308 env[1212]: 2025-05-14 00:48:03.901 [INFO][3487] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:03.905679 env[1212]: time="2025-05-14T00:48:03.905640849Z" level=info msg="TearDown network for sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\" successfully" May 14 00:48:03.905764 env[1212]: time="2025-05-14T00:48:03.905746896Z" level=info msg="StopPodSandbox for \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\" returns successfully" May 14 00:48:03.907550 systemd[1]: run-netns-cni\x2d6fa80a26\x2dd3e3\x2d9a0f\x2ddc19\x2d8c04b046a6d6.mount: Deactivated successfully. May 14 00:48:03.909088 env[1212]: time="2025-05-14T00:48:03.908114289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c856d6799-4t4bd,Uid:f27fc4b7-dd9e-4481-aeb6-12e6130e42ea,Namespace:calico-apiserver,Attempt:1,}" May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.812 [INFO][3488] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.812 [INFO][3488] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" iface="eth0" netns="/var/run/netns/cni-16a8d7d5-020b-8a99-b240-5bd97cccf1cf" May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.813 [INFO][3488] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" iface="eth0" netns="/var/run/netns/cni-16a8d7d5-020b-8a99-b240-5bd97cccf1cf" May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.814 [INFO][3488] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" iface="eth0" netns="/var/run/netns/cni-16a8d7d5-020b-8a99-b240-5bd97cccf1cf" May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.814 [INFO][3488] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.814 [INFO][3488] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.883 [INFO][3507] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" HandleID="k8s-pod-network.89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.883 [INFO][3507] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.895 [INFO][3507] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.905 [WARNING][3507] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" HandleID="k8s-pod-network.89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.905 [INFO][3507] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" HandleID="k8s-pod-network.89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.910 [INFO][3507] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:03.913889 env[1212]: 2025-05-14 00:48:03.912 [INFO][3488] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:03.914352 env[1212]: time="2025-05-14T00:48:03.913940266Z" level=info msg="TearDown network for sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\" successfully" May 14 00:48:03.914352 env[1212]: time="2025-05-14T00:48:03.913962587Z" level=info msg="StopPodSandbox for \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\" returns successfully" May 14 00:48:03.915833 systemd[1]: run-netns-cni\x2d16a8d7d5\x2d020b\x2d8a99\x2db240\x2d5bd97cccf1cf.mount: Deactivated successfully. May 14 00:48:03.916200 env[1212]: time="2025-05-14T00:48:03.916132608Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8656ccb584-l42f8,Uid:c82c1ca9-af53-4961-9e06-6c41aa4edf49,Namespace:calico-system,Attempt:1,}" May 14 00:48:04.124265 systemd-networkd[1050]: caliba306bbc65e: Link UP May 14 00:48:04.125984 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:48:04.126035 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliba306bbc65e: link becomes ready May 14 00:48:04.126088 systemd-networkd[1050]: caliba306bbc65e: Gained carrier May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:03.952 [INFO][3528] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:03.972 [INFO][3528] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0 calico-apiserver-5c856d6799- calico-apiserver f27fc4b7-dd9e-4481-aeb6-12e6130e42ea 882 0 2025-05-14 00:47:44 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c856d6799 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5c856d6799-4t4bd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliba306bbc65e [] []}} ContainerID="22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-4t4bd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:03.972 [INFO][3528] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-4t4bd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.017 [INFO][3561] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" HandleID="k8s-pod-network.22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.039 [INFO][3561] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" HandleID="k8s-pod-network.22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000369b70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5c856d6799-4t4bd", "timestamp":"2025-05-14 00:48:04.017138784 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.039 [INFO][3561] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.039 [INFO][3561] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.039 [INFO][3561] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.041 [INFO][3561] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" host="localhost" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.048 [INFO][3561] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.052 [INFO][3561] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.054 [INFO][3561] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.056 [INFO][3561] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.056 [INFO][3561] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" host="localhost" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.057 [INFO][3561] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9 May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.102 [INFO][3561] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" host="localhost" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.113 [INFO][3561] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" host="localhost" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.113 [INFO][3561] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" host="localhost" May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.113 [INFO][3561] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:04.146632 env[1212]: 2025-05-14 00:48:04.113 [INFO][3561] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" HandleID="k8s-pod-network.22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:04.147284 env[1212]: 2025-05-14 00:48:04.115 [INFO][3528] cni-plugin/k8s.go 386: Populated endpoint ContainerID="22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-4t4bd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0", GenerateName:"calico-apiserver-5c856d6799-", Namespace:"calico-apiserver", SelfLink:"", UID:"f27fc4b7-dd9e-4481-aeb6-12e6130e42ea", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c856d6799", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5c856d6799-4t4bd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliba306bbc65e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:04.147284 env[1212]: 2025-05-14 00:48:04.115 [INFO][3528] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-4t4bd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:04.147284 env[1212]: 2025-05-14 00:48:04.115 [INFO][3528] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliba306bbc65e ContainerID="22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-4t4bd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:04.147284 env[1212]: 2025-05-14 00:48:04.126 [INFO][3528] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-4t4bd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:04.147284 env[1212]: 2025-05-14 00:48:04.126 [INFO][3528] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-4t4bd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0", GenerateName:"calico-apiserver-5c856d6799-", Namespace:"calico-apiserver", SelfLink:"", UID:"f27fc4b7-dd9e-4481-aeb6-12e6130e42ea", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c856d6799", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9", Pod:"calico-apiserver-5c856d6799-4t4bd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliba306bbc65e", MAC:"c2:14:a6:08:52:45", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:04.147284 env[1212]: 2025-05-14 00:48:04.138 [INFO][3528] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-4t4bd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:04.165548 env[1212]: time="2025-05-14T00:48:04.164644251Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:04.165548 env[1212]: time="2025-05-14T00:48:04.165513225Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:04.165548 env[1212]: time="2025-05-14T00:48:04.165524746Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:04.166748 env[1212]: time="2025-05-14T00:48:04.166657337Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9 pid=3614 runtime=io.containerd.runc.v2 May 14 00:48:04.172812 systemd-networkd[1050]: cali957d40a9165: Link UP May 14 00:48:04.174119 systemd-networkd[1050]: cali957d40a9165: Gained carrier May 14 00:48:04.174548 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali957d40a9165: link becomes ready May 14 00:48:04.182650 systemd[1]: Started cri-containerd-22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9.scope. May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:03.952 [INFO][3523] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:03.970 [INFO][3523] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0 calico-kube-controllers-8656ccb584- calico-system c82c1ca9-af53-4961-9e06-6c41aa4edf49 883 0 2025-05-14 00:47:44 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:8656ccb584 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-8656ccb584-l42f8 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali957d40a9165 [] []}} ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Namespace="calico-system" Pod="calico-kube-controllers-8656ccb584-l42f8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:03.970 [INFO][3523] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Namespace="calico-system" Pod="calico-kube-controllers-8656ccb584-l42f8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.017 [INFO][3563] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" HandleID="k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.039 [INFO][3563] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" HandleID="k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003aabb0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-8656ccb584-l42f8", "timestamp":"2025-05-14 00:48:04.017279913 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.039 [INFO][3563] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.113 [INFO][3563] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.113 [INFO][3563] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.141 [INFO][3563] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" host="localhost" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.147 [INFO][3563] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.153 [INFO][3563] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.155 [INFO][3563] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.157 [INFO][3563] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.157 [INFO][3563] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" host="localhost" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.159 [INFO][3563] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8 May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.163 [INFO][3563] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" host="localhost" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.168 [INFO][3563] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" host="localhost" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.168 [INFO][3563] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" host="localhost" May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.168 [INFO][3563] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:04.189190 env[1212]: 2025-05-14 00:48:04.168 [INFO][3563] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" HandleID="k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:04.189844 env[1212]: 2025-05-14 00:48:04.170 [INFO][3523] cni-plugin/k8s.go 386: Populated endpoint ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Namespace="calico-system" Pod="calico-kube-controllers-8656ccb584-l42f8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0", GenerateName:"calico-kube-controllers-8656ccb584-", Namespace:"calico-system", SelfLink:"", UID:"c82c1ca9-af53-4961-9e06-6c41aa4edf49", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8656ccb584", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-8656ccb584-l42f8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali957d40a9165", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:04.189844 env[1212]: 2025-05-14 00:48:04.170 [INFO][3523] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Namespace="calico-system" Pod="calico-kube-controllers-8656ccb584-l42f8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:04.189844 env[1212]: 2025-05-14 00:48:04.170 [INFO][3523] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali957d40a9165 ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Namespace="calico-system" Pod="calico-kube-controllers-8656ccb584-l42f8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:04.189844 env[1212]: 2025-05-14 00:48:04.174 [INFO][3523] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Namespace="calico-system" Pod="calico-kube-controllers-8656ccb584-l42f8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:04.189844 env[1212]: 2025-05-14 00:48:04.175 [INFO][3523] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Namespace="calico-system" Pod="calico-kube-controllers-8656ccb584-l42f8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0", GenerateName:"calico-kube-controllers-8656ccb584-", Namespace:"calico-system", SelfLink:"", UID:"c82c1ca9-af53-4961-9e06-6c41aa4edf49", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8656ccb584", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8", Pod:"calico-kube-controllers-8656ccb584-l42f8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali957d40a9165", MAC:"72:58:00:f2:0c:e3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:04.189844 env[1212]: 2025-05-14 00:48:04.187 [INFO][3523] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Namespace="calico-system" Pod="calico-kube-controllers-8656ccb584-l42f8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:04.210782 env[1212]: time="2025-05-14T00:48:04.210703612Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:04.210782 env[1212]: time="2025-05-14T00:48:04.210751655Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:04.210974 env[1212]: time="2025-05-14T00:48:04.210762975Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:04.211024 env[1212]: time="2025-05-14T00:48:04.210968068Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8 pid=3658 runtime=io.containerd.runc.v2 May 14 00:48:04.228317 systemd[1]: Started cri-containerd-33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8.scope. May 14 00:48:04.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.237737 kernel: kauditd_printk_skb: 79 callbacks suppressed May 14 00:48:04.237834 kernel: audit: type=1400 audit(1747183684.233:1025): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.237859 kernel: audit: type=1400 audit(1747183684.233:1026): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.242551 kernel: audit: type=1400 audit(1747183684.233:1027): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.242625 kernel: audit: type=1400 audit(1747183684.233:1028): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.247527 kernel: audit: type=1400 audit(1747183684.233:1029): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.247980 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:04.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.251277 kernel: audit: type=1400 audit(1747183684.233:1030): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.251337 kernel: audit: type=1400 audit(1747183684.233:1031): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.256025 kernel: audit: type=1400 audit(1747183684.233:1032): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.258619 kernel: audit: type=1400 audit(1747183684.233:1033): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.258687 kernel: audit: type=1400 audit(1747183684.234:1034): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.235000 audit: BPF prog-id=139 op=LOAD May 14 00:48:04.239000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3614 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232643666393564386333393862336230356335653462653935626563 May 14 00:48:04.239000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3614 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232643666393564386333393862336230356335653462653935626563 May 14 00:48:04.239000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.239000 audit: BPF prog-id=140 op=LOAD May 14 00:48:04.239000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3614 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232643666393564386333393862336230356335653462653935626563 May 14 00:48:04.241000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.241000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.241000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.241000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.241000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.241000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.241000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.241000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.241000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.241000 audit: BPF prog-id=141 op=LOAD May 14 00:48:04.241000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3614 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232643666393564386333393862336230356335653462653935626563 May 14 00:48:04.243000 audit: BPF prog-id=141 op=UNLOAD May 14 00:48:04.243000 audit: BPF prog-id=140 op=UNLOAD May 14 00:48:04.243000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.243000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.243000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.243000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.243000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.243000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.243000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.243000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.243000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.243000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.243000 audit: BPF prog-id=142 op=LOAD May 14 00:48:04.243000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3614 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232643666393564386333393862336230356335653462653935626563 May 14 00:48:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.261000 audit: BPF prog-id=143 op=LOAD May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3658 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333623936373361323237306137636230636662643032386636616563 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3658 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333623936373361323237306137636230636662643032386636616563 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit: BPF prog-id=144 op=LOAD May 14 00:48:04.262000 audit[3669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3658 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333623936373361323237306137636230636662643032386636616563 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit: BPF prog-id=145 op=LOAD May 14 00:48:04.262000 audit[3669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3658 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333623936373361323237306137636230636662643032386636616563 May 14 00:48:04.262000 audit: BPF prog-id=145 op=UNLOAD May 14 00:48:04.262000 audit: BPF prog-id=144 op=UNLOAD May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.262000 audit: BPF prog-id=146 op=LOAD May 14 00:48:04.262000 audit[3669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3658 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333623936373361323237306137636230636662643032386636616563 May 14 00:48:04.265551 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:04.272676 env[1212]: time="2025-05-14T00:48:04.272555000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c856d6799-4t4bd,Uid:f27fc4b7-dd9e-4481-aeb6-12e6130e42ea,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9\"" May 14 00:48:04.281012 env[1212]: time="2025-05-14T00:48:04.280969927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 14 00:48:04.289640 env[1212]: time="2025-05-14T00:48:04.289599146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8656ccb584-l42f8,Uid:c82c1ca9-af53-4961-9e06-6c41aa4edf49,Namespace:calico-system,Attempt:1,} returns sandbox id \"33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8\"" May 14 00:48:05.367977 systemd[1]: Started sshd@8-10.0.0.97:22-10.0.0.1:49820.service. May 14 00:48:05.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.97:22-10.0.0.1:49820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:05.420000 audit[3722]: USER_ACCT pid=3722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:05.422367 sshd[3722]: Accepted publickey for core from 10.0.0.1 port 49820 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:05.422000 audit[3722]: CRED_ACQ pid=3722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:05.422000 audit[3722]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff10dcc20 a2=3 a3=1 items=0 ppid=1 pid=3722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:05.422000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:05.424369 sshd[3722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:05.428017 systemd-logind[1200]: New session 9 of user core. May 14 00:48:05.428913 systemd[1]: Started session-9.scope. May 14 00:48:05.430000 audit[3722]: USER_START pid=3722 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:05.432000 audit[3724]: CRED_ACQ pid=3724 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:05.580485 sshd[3722]: pam_unix(sshd:session): session closed for user core May 14 00:48:05.580000 audit[3722]: USER_END pid=3722 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:05.580000 audit[3722]: CRED_DISP pid=3722 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:05.583420 systemd-logind[1200]: Session 9 logged out. Waiting for processes to exit. May 14 00:48:05.583683 systemd[1]: sshd@8-10.0.0.97:22-10.0.0.1:49820.service: Deactivated successfully. May 14 00:48:05.584388 systemd[1]: session-9.scope: Deactivated successfully. May 14 00:48:05.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.97:22-10.0.0.1:49820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:05.585082 systemd-logind[1200]: Removed session 9. May 14 00:48:05.614548 systemd-networkd[1050]: cali957d40a9165: Gained IPv6LL May 14 00:48:05.678141 env[1212]: time="2025-05-14T00:48:05.678030821Z" level=info msg="StopPodSandbox for \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\"" May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.743 [INFO][3751] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.743 [INFO][3751] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" iface="eth0" netns="/var/run/netns/cni-0a30fce1-4c16-22bd-a419-5fb7995faa31" May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.743 [INFO][3751] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" iface="eth0" netns="/var/run/netns/cni-0a30fce1-4c16-22bd-a419-5fb7995faa31" May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.743 [INFO][3751] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" iface="eth0" netns="/var/run/netns/cni-0a30fce1-4c16-22bd-a419-5fb7995faa31" May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.743 [INFO][3751] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.743 [INFO][3751] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.762 [INFO][3761] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" HandleID="k8s-pod-network.c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.762 [INFO][3761] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.762 [INFO][3761] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.771 [WARNING][3761] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" HandleID="k8s-pod-network.c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.771 [INFO][3761] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" HandleID="k8s-pod-network.c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.773 [INFO][3761] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:05.777803 env[1212]: 2025-05-14 00:48:05.775 [INFO][3751] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:05.779979 systemd[1]: run-netns-cni\x2d0a30fce1\x2d4c16\x2d22bd\x2da419\x2d5fb7995faa31.mount: Deactivated successfully. May 14 00:48:05.781483 env[1212]: time="2025-05-14T00:48:05.780720842Z" level=info msg="TearDown network for sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\" successfully" May 14 00:48:05.781483 env[1212]: time="2025-05-14T00:48:05.780762684Z" level=info msg="StopPodSandbox for \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\" returns successfully" May 14 00:48:05.781631 kubelet[1952]: E0514 00:48:05.781035 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:05.782146 env[1212]: time="2025-05-14T00:48:05.782111006Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-7fmr6,Uid:62cca936-2867-4a1c-90ed-75f701fd8645,Namespace:kube-system,Attempt:1,}" May 14 00:48:05.934528 systemd-networkd[1050]: caliba306bbc65e: Gained IPv6LL May 14 00:48:05.995837 systemd-networkd[1050]: cali984b86d297c: Link UP May 14 00:48:05.997931 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:48:05.998011 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali984b86d297c: link becomes ready May 14 00:48:05.997969 systemd-networkd[1050]: cali984b86d297c: Gained carrier May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.909 [INFO][3768] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.922 [INFO][3768] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0 coredns-668d6bf9bc- kube-system 62cca936-2867-4a1c-90ed-75f701fd8645 904 0 2025-05-14 00:47:38 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-7fmr6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali984b86d297c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" Namespace="kube-system" Pod="coredns-668d6bf9bc-7fmr6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7fmr6-" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.922 [INFO][3768] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" Namespace="kube-system" Pod="coredns-668d6bf9bc-7fmr6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.960 [INFO][3784] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" HandleID="k8s-pod-network.15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.970 [INFO][3784] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" HandleID="k8s-pod-network.15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000438370), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-7fmr6", "timestamp":"2025-05-14 00:48:05.960184394 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.970 [INFO][3784] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.970 [INFO][3784] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.970 [INFO][3784] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.972 [INFO][3784] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" host="localhost" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.975 [INFO][3784] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.979 [INFO][3784] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.980 [INFO][3784] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.982 [INFO][3784] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.982 [INFO][3784] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" host="localhost" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.984 [INFO][3784] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.987 [INFO][3784] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" host="localhost" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.992 [INFO][3784] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" host="localhost" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.992 [INFO][3784] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" host="localhost" May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.992 [INFO][3784] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:06.013965 env[1212]: 2025-05-14 00:48:05.992 [INFO][3784] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" HandleID="k8s-pod-network.15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:06.014573 env[1212]: 2025-05-14 00:48:05.994 [INFO][3768] cni-plugin/k8s.go 386: Populated endpoint ContainerID="15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" Namespace="kube-system" Pod="coredns-668d6bf9bc-7fmr6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"62cca936-2867-4a1c-90ed-75f701fd8645", ResourceVersion:"904", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-7fmr6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali984b86d297c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:06.014573 env[1212]: 2025-05-14 00:48:05.994 [INFO][3768] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" Namespace="kube-system" Pod="coredns-668d6bf9bc-7fmr6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:06.014573 env[1212]: 2025-05-14 00:48:05.994 [INFO][3768] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali984b86d297c ContainerID="15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" Namespace="kube-system" Pod="coredns-668d6bf9bc-7fmr6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:06.014573 env[1212]: 2025-05-14 00:48:05.998 [INFO][3768] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" Namespace="kube-system" Pod="coredns-668d6bf9bc-7fmr6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:06.014573 env[1212]: 2025-05-14 00:48:06.001 [INFO][3768] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" Namespace="kube-system" Pod="coredns-668d6bf9bc-7fmr6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"62cca936-2867-4a1c-90ed-75f701fd8645", ResourceVersion:"904", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac", Pod:"coredns-668d6bf9bc-7fmr6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali984b86d297c", MAC:"06:10:54:da:b9:b8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:06.014573 env[1212]: 2025-05-14 00:48:06.010 [INFO][3768] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac" Namespace="kube-system" Pod="coredns-668d6bf9bc-7fmr6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:06.023911 env[1212]: time="2025-05-14T00:48:06.023831608Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:06.023911 env[1212]: time="2025-05-14T00:48:06.023876331Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:06.023911 env[1212]: time="2025-05-14T00:48:06.023887251Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:06.024116 env[1212]: time="2025-05-14T00:48:06.024052461Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac pid=3812 runtime=io.containerd.runc.v2 May 14 00:48:06.040519 systemd[1]: Started cri-containerd-15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac.scope. May 14 00:48:06.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit: BPF prog-id=147 op=LOAD May 14 00:48:06.075000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3812 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135646663383464323332326566383533303565393337366634636239 May 14 00:48:06.075000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3812 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135646663383464323332326566383533303565393337366634636239 May 14 00:48:06.075000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.075000 audit: BPF prog-id=148 op=LOAD May 14 00:48:06.075000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3812 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135646663383464323332326566383533303565393337366634636239 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit: BPF prog-id=149 op=LOAD May 14 00:48:06.076000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3812 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135646663383464323332326566383533303565393337366634636239 May 14 00:48:06.076000 audit: BPF prog-id=149 op=UNLOAD May 14 00:48:06.076000 audit: BPF prog-id=148 op=UNLOAD May 14 00:48:06.076000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.076000 audit: BPF prog-id=150 op=LOAD May 14 00:48:06.076000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3812 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135646663383464323332326566383533303565393337366634636239 May 14 00:48:06.078155 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:06.102190 env[1212]: time="2025-05-14T00:48:06.102130207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-7fmr6,Uid:62cca936-2867-4a1c-90ed-75f701fd8645,Namespace:kube-system,Attempt:1,} returns sandbox id \"15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac\"" May 14 00:48:06.103058 kubelet[1952]: E0514 00:48:06.103023 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:06.104847 env[1212]: time="2025-05-14T00:48:06.104807044Z" level=info msg="CreateContainer within sandbox \"15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 14 00:48:06.125313 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3736007354.mount: Deactivated successfully. May 14 00:48:06.133972 env[1212]: time="2025-05-14T00:48:06.133914474Z" level=info msg="CreateContainer within sandbox \"15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a6143ea6075150c8baabf002ff6ede9192119d3b8aeb95d780cade75a79f8d50\"" May 14 00:48:06.134452 env[1212]: time="2025-05-14T00:48:06.134422864Z" level=info msg="StartContainer for \"a6143ea6075150c8baabf002ff6ede9192119d3b8aeb95d780cade75a79f8d50\"" May 14 00:48:06.160079 systemd[1]: Started cri-containerd-a6143ea6075150c8baabf002ff6ede9192119d3b8aeb95d780cade75a79f8d50.scope. May 14 00:48:06.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit: BPF prog-id=151 op=LOAD May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3812 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313433656136303735313530633862616162663030326666366564 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3812 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313433656136303735313530633862616162663030326666366564 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit: BPF prog-id=152 op=LOAD May 14 00:48:06.193000 audit[3865]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3812 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313433656136303735313530633862616162663030326666366564 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit: BPF prog-id=153 op=LOAD May 14 00:48:06.193000 audit[3865]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3812 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313433656136303735313530633862616162663030326666366564 May 14 00:48:06.193000 audit: BPF prog-id=153 op=UNLOAD May 14 00:48:06.193000 audit: BPF prog-id=152 op=UNLOAD May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.193000 audit: BPF prog-id=154 op=LOAD May 14 00:48:06.193000 audit[3865]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3812 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313433656136303735313530633862616162663030326666366564 May 14 00:48:06.215213 env[1212]: time="2025-05-14T00:48:06.215164246Z" level=info msg="StartContainer for \"a6143ea6075150c8baabf002ff6ede9192119d3b8aeb95d780cade75a79f8d50\" returns successfully" May 14 00:48:06.365000 audit[3882]: AVC avc: denied { getattr } for pid=3882 comm="coredns" path="cgroup:[4026532328]" dev="nsfs" ino=4026532328 scontext=system_u:system_r:svirt_lxc_net_t:s0:c372,c776 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 14 00:48:06.365000 audit[3882]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000056a38 a2=40000da578 a3=0 items=0 ppid=3812 pid=3882 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c372,c776 key=(null) May 14 00:48:06.365000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 14 00:48:06.500938 env[1212]: time="2025-05-14T00:48:06.500831865Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:06.503769 env[1212]: time="2025-05-14T00:48:06.503725715Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:06.505420 env[1212]: time="2025-05-14T00:48:06.505383292Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:06.508177 env[1212]: time="2025-05-14T00:48:06.508143294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:06.508898 env[1212]: time="2025-05-14T00:48:06.508866937Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 14 00:48:06.510936 env[1212]: time="2025-05-14T00:48:06.510911577Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 14 00:48:06.511544 env[1212]: time="2025-05-14T00:48:06.511512812Z" level=info msg="CreateContainer within sandbox \"22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 14 00:48:06.524672 env[1212]: time="2025-05-14T00:48:06.524613021Z" level=info msg="CreateContainer within sandbox \"22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9e3fb8b7380a3770c0106e4a3f9dd0df86b39b7b783db0f4d5d0afc1ea0498b2\"" May 14 00:48:06.525461 env[1212]: time="2025-05-14T00:48:06.525373626Z" level=info msg="StartContainer for \"9e3fb8b7380a3770c0106e4a3f9dd0df86b39b7b783db0f4d5d0afc1ea0498b2\"" May 14 00:48:06.545137 systemd[1]: Started cri-containerd-9e3fb8b7380a3770c0106e4a3f9dd0df86b39b7b783db0f4d5d0afc1ea0498b2.scope. May 14 00:48:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.573000 audit: BPF prog-id=155 op=LOAD May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3614 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965336662386237333830613337373063303130366534613366396464 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3614 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965336662386237333830613337373063303130366534613366396464 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit: BPF prog-id=156 op=LOAD May 14 00:48:06.574000 audit[3910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3614 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965336662386237333830613337373063303130366534613366396464 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit: BPF prog-id=157 op=LOAD May 14 00:48:06.574000 audit[3910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3614 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965336662386237333830613337373063303130366534613366396464 May 14 00:48:06.574000 audit: BPF prog-id=157 op=UNLOAD May 14 00:48:06.574000 audit: BPF prog-id=156 op=UNLOAD May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:06.574000 audit: BPF prog-id=158 op=LOAD May 14 00:48:06.574000 audit[3910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3614 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965336662386237333830613337373063303130366534613366396464 May 14 00:48:06.602120 env[1212]: time="2025-05-14T00:48:06.602068371Z" level=info msg="StartContainer for \"9e3fb8b7380a3770c0106e4a3f9dd0df86b39b7b783db0f4d5d0afc1ea0498b2\" returns successfully" May 14 00:48:06.678027 env[1212]: time="2025-05-14T00:48:06.677951948Z" level=info msg="StopPodSandbox for \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\"" May 14 00:48:06.678194 env[1212]: time="2025-05-14T00:48:06.678166560Z" level=info msg="StopPodSandbox for \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\"" May 14 00:48:06.787043 kubelet[1952]: E0514 00:48:06.786936 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.727 [INFO][3971] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.727 [INFO][3971] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" iface="eth0" netns="/var/run/netns/cni-18631530-16b7-da93-bad3-fd584082a354" May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.727 [INFO][3971] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" iface="eth0" netns="/var/run/netns/cni-18631530-16b7-da93-bad3-fd584082a354" May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.727 [INFO][3971] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" iface="eth0" netns="/var/run/netns/cni-18631530-16b7-da93-bad3-fd584082a354" May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.727 [INFO][3971] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.728 [INFO][3971] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.778 [INFO][3992] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.778 [INFO][3992] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.778 [INFO][3992] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.787 [WARNING][3992] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.787 [INFO][3992] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.792 [INFO][3992] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:06.811282 env[1212]: 2025-05-14 00:48:06.795 [INFO][3971] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:06.811866 env[1212]: time="2025-05-14T00:48:06.811644080Z" level=info msg="TearDown network for sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\" successfully" May 14 00:48:06.811866 env[1212]: time="2025-05-14T00:48:06.811689123Z" level=info msg="StopPodSandbox for \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\" returns successfully" May 14 00:48:06.812847 kubelet[1952]: I0514 00:48:06.812554 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-7fmr6" podStartSLOduration=28.812536453 podStartE2EDuration="28.812536453s" podCreationTimestamp="2025-05-14 00:47:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:48:06.812228634 +0000 UTC m=+35.229366879" watchObservedRunningTime="2025-05-14 00:48:06.812536453 +0000 UTC m=+35.229674698" May 14 00:48:06.812847 kubelet[1952]: I0514 00:48:06.812727 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c856d6799-4t4bd" podStartSLOduration=20.582743247 podStartE2EDuration="22.812721543s" podCreationTimestamp="2025-05-14 00:47:44 +0000 UTC" firstStartedPulling="2025-05-14 00:48:04.280165956 +0000 UTC m=+32.697304161" lastFinishedPulling="2025-05-14 00:48:06.510144212 +0000 UTC m=+34.927282457" observedRunningTime="2025-05-14 00:48:06.798842568 +0000 UTC m=+35.215980853" watchObservedRunningTime="2025-05-14 00:48:06.812721543 +0000 UTC m=+35.229859788" May 14 00:48:06.814534 env[1212]: time="2025-05-14T00:48:06.814057462Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-645b7c96b4-9ffhl,Uid:01c5ffd5-98f0-41f4-ac02-cee91eb6a543,Namespace:calico-apiserver,Attempt:1,}" May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.746 [INFO][3982] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.746 [INFO][3982] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" iface="eth0" netns="/var/run/netns/cni-92799b41-82f0-6e4b-4b25-e81df30a1b0c" May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.746 [INFO][3982] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" iface="eth0" netns="/var/run/netns/cni-92799b41-82f0-6e4b-4b25-e81df30a1b0c" May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.747 [INFO][3982] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" iface="eth0" netns="/var/run/netns/cni-92799b41-82f0-6e4b-4b25-e81df30a1b0c" May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.747 [INFO][3982] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.747 [INFO][3982] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.805 [INFO][4001] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" HandleID="k8s-pod-network.b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.805 [INFO][4001] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.805 [INFO][4001] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.818 [WARNING][4001] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" HandleID="k8s-pod-network.b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.818 [INFO][4001] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" HandleID="k8s-pod-network.b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.823 [INFO][4001] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:06.829385 env[1212]: 2025-05-14 00:48:06.826 [INFO][3982] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:06.829801 env[1212]: time="2025-05-14T00:48:06.829506409Z" level=info msg="TearDown network for sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\" successfully" May 14 00:48:06.829801 env[1212]: time="2025-05-14T00:48:06.829531811Z" level=info msg="StopPodSandbox for \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\" returns successfully" May 14 00:48:06.830104 kubelet[1952]: E0514 00:48:06.830074 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:06.831673 env[1212]: time="2025-05-14T00:48:06.831041339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-k84nz,Uid:427b275f-8795-4674-81ba-05adaf2dfdcc,Namespace:kube-system,Attempt:1,}" May 14 00:48:06.866000 audit[4036]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=4036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:06.866000 audit[4036]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffc8f73220 a2=0 a3=1 items=0 ppid=2144 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.866000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:06.878000 audit[4036]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=4036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:06.878000 audit[4036]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc8f73220 a2=0 a3=1 items=0 ppid=2144 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.878000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:06.888000 audit[4040]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=4040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:06.888000 audit[4040]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe1c206e0 a2=0 a3=1 items=0 ppid=2144 pid=4040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:06.895000 audit[4040]: NETFILTER_CFG table=nat:98 family=2 entries=33 op=nft_register_chain pid=4040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:06.895000 audit[4040]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffe1c206e0 a2=0 a3=1 items=0 ppid=2144 pid=4040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:06.967958 systemd-networkd[1050]: cali049ce7497c7: Link UP May 14 00:48:06.969477 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali049ce7497c7: link becomes ready May 14 00:48:06.974338 systemd-networkd[1050]: cali049ce7497c7: Gained carrier May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.865 [INFO][4011] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.883 [INFO][4011] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0 calico-apiserver-645b7c96b4- calico-apiserver 01c5ffd5-98f0-41f4-ac02-cee91eb6a543 920 0 2025-05-14 00:47:44 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:645b7c96b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-645b7c96b4-9ffhl eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali049ce7497c7 [] []}} ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-9ffhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.883 [INFO][4011] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-9ffhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.924 [INFO][4042] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.941 [INFO][4042] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000305e60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-645b7c96b4-9ffhl", "timestamp":"2025-05-14 00:48:06.92485629 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.941 [INFO][4042] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.941 [INFO][4042] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.941 [INFO][4042] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.943 [INFO][4042] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" host="localhost" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.946 [INFO][4042] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.951 [INFO][4042] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.952 [INFO][4042] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.954 [INFO][4042] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.954 [INFO][4042] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" host="localhost" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.956 [INFO][4042] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2 May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.959 [INFO][4042] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" host="localhost" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.964 [INFO][4042] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" host="localhost" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.964 [INFO][4042] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" host="localhost" May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.964 [INFO][4042] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:06.980476 env[1212]: 2025-05-14 00:48:06.964 [INFO][4042] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:06.981022 env[1212]: 2025-05-14 00:48:06.966 [INFO][4011] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-9ffhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0", GenerateName:"calico-apiserver-645b7c96b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"01c5ffd5-98f0-41f4-ac02-cee91eb6a543", ResourceVersion:"920", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"645b7c96b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-645b7c96b4-9ffhl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali049ce7497c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:06.981022 env[1212]: 2025-05-14 00:48:06.966 [INFO][4011] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-9ffhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:06.981022 env[1212]: 2025-05-14 00:48:06.967 [INFO][4011] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali049ce7497c7 ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-9ffhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:06.981022 env[1212]: 2025-05-14 00:48:06.969 [INFO][4011] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-9ffhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:06.981022 env[1212]: 2025-05-14 00:48:06.969 [INFO][4011] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-9ffhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0", GenerateName:"calico-apiserver-645b7c96b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"01c5ffd5-98f0-41f4-ac02-cee91eb6a543", ResourceVersion:"920", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"645b7c96b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2", Pod:"calico-apiserver-645b7c96b4-9ffhl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali049ce7497c7", MAC:"b6:9d:56:fa:88:4f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:06.981022 env[1212]: 2025-05-14 00:48:06.976 [INFO][4011] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-9ffhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:06.994607 env[1212]: time="2025-05-14T00:48:06.994542183Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:06.994728 env[1212]: time="2025-05-14T00:48:06.994591665Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:06.994728 env[1212]: time="2025-05-14T00:48:06.994602026Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:06.994803 env[1212]: time="2025-05-14T00:48:06.994736634Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2 pid=4077 runtime=io.containerd.runc.v2 May 14 00:48:07.004676 systemd[1]: Started cri-containerd-7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2.scope. May 14 00:48:07.030276 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3623691038.mount: Deactivated successfully. May 14 00:48:07.030360 systemd[1]: run-netns-cni\x2d92799b41\x2d82f0\x2d6e4b\x2d4b25\x2de81df30a1b0c.mount: Deactivated successfully. May 14 00:48:07.030422 systemd[1]: run-netns-cni\x2d18631530\x2d16b7\x2dda93\x2dbad3\x2dfd584082a354.mount: Deactivated successfully. May 14 00:48:07.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.032000 audit: BPF prog-id=159 op=LOAD May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4077 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765383561303635373131623734663937303532363037636239623463 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4077 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765383561303635373131623734663937303532363037636239623463 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit: BPF prog-id=160 op=LOAD May 14 00:48:07.033000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4077 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765383561303635373131623734663937303532363037636239623463 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit: BPF prog-id=161 op=LOAD May 14 00:48:07.033000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4077 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765383561303635373131623734663937303532363037636239623463 May 14 00:48:07.033000 audit: BPF prog-id=161 op=UNLOAD May 14 00:48:07.033000 audit: BPF prog-id=160 op=UNLOAD May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.033000 audit: BPF prog-id=162 op=LOAD May 14 00:48:07.033000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4077 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765383561303635373131623734663937303532363037636239623463 May 14 00:48:07.037167 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:07.065138 env[1212]: time="2025-05-14T00:48:07.065100337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-645b7c96b4-9ffhl,Uid:01c5ffd5-98f0-41f4-ac02-cee91eb6a543,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\"" May 14 00:48:07.068941 env[1212]: time="2025-05-14T00:48:07.068910114Z" level=info msg="CreateContainer within sandbox \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 14 00:48:07.073859 systemd-networkd[1050]: cali5ee21d42c09: Link UP May 14 00:48:07.075810 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:48:07.075911 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ee21d42c09: link becomes ready May 14 00:48:07.081348 systemd-networkd[1050]: cali5ee21d42c09: Gained carrier May 14 00:48:07.083510 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1801642311.mount: Deactivated successfully. May 14 00:48:07.092468 env[1212]: time="2025-05-14T00:48:07.092414574Z" level=info msg="CreateContainer within sandbox \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\"" May 14 00:48:07.094449 env[1212]: time="2025-05-14T00:48:07.094378806Z" level=info msg="StartContainer for \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\"" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:06.872 [INFO][4023] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:06.887 [INFO][4023] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--k84nz-eth0 coredns-668d6bf9bc- kube-system 427b275f-8795-4674-81ba-05adaf2dfdcc 922 0 2025-05-14 00:47:38 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-k84nz eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5ee21d42c09 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" Namespace="kube-system" Pod="coredns-668d6bf9bc-k84nz" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--k84nz-" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:06.887 [INFO][4023] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" Namespace="kube-system" Pod="coredns-668d6bf9bc-k84nz" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:06.931 [INFO][4049] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" HandleID="k8s-pod-network.d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:06.944 [INFO][4049] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" HandleID="k8s-pod-network.d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003bb730), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-k84nz", "timestamp":"2025-05-14 00:48:06.931120338 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:06.944 [INFO][4049] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:06.964 [INFO][4049] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:06.965 [INFO][4049] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.044 [INFO][4049] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" host="localhost" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.048 [INFO][4049] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.052 [INFO][4049] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.054 [INFO][4049] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.056 [INFO][4049] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.056 [INFO][4049] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" host="localhost" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.057 [INFO][4049] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59 May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.061 [INFO][4049] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" host="localhost" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.067 [INFO][4049] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" host="localhost" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.067 [INFO][4049] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" host="localhost" May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.067 [INFO][4049] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:07.094655 env[1212]: 2025-05-14 00:48:07.067 [INFO][4049] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" HandleID="k8s-pod-network.d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:07.096046 env[1212]: 2025-05-14 00:48:07.072 [INFO][4023] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" Namespace="kube-system" Pod="coredns-668d6bf9bc-k84nz" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--k84nz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"427b275f-8795-4674-81ba-05adaf2dfdcc", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-k84nz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5ee21d42c09", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:07.096046 env[1212]: 2025-05-14 00:48:07.072 [INFO][4023] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" Namespace="kube-system" Pod="coredns-668d6bf9bc-k84nz" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:07.096046 env[1212]: 2025-05-14 00:48:07.072 [INFO][4023] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ee21d42c09 ContainerID="d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" Namespace="kube-system" Pod="coredns-668d6bf9bc-k84nz" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:07.096046 env[1212]: 2025-05-14 00:48:07.076 [INFO][4023] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" Namespace="kube-system" Pod="coredns-668d6bf9bc-k84nz" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:07.096046 env[1212]: 2025-05-14 00:48:07.076 [INFO][4023] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" Namespace="kube-system" Pod="coredns-668d6bf9bc-k84nz" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--k84nz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"427b275f-8795-4674-81ba-05adaf2dfdcc", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59", Pod:"coredns-668d6bf9bc-k84nz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5ee21d42c09", MAC:"c2:f3:d2:6d:5a:8c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:07.096046 env[1212]: 2025-05-14 00:48:07.092 [INFO][4023] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59" Namespace="kube-system" Pod="coredns-668d6bf9bc-k84nz" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:07.113855 systemd[1]: Started cri-containerd-c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28.scope. May 14 00:48:07.117960 env[1212]: time="2025-05-14T00:48:07.117879785Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:07.118117 env[1212]: time="2025-05-14T00:48:07.117938669Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:07.118117 env[1212]: time="2025-05-14T00:48:07.117953029Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:07.118213 env[1212]: time="2025-05-14T00:48:07.118132840Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59 pid=4147 runtime=io.containerd.runc.v2 May 14 00:48:07.129779 systemd[1]: Started cri-containerd-d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59.scope. May 14 00:48:07.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit: BPF prog-id=163 op=LOAD May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4077 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393136323665376239643436393363646363393765356363303363 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4077 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393136323665376239643436393363646363393765356363303363 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit: BPF prog-id=164 op=LOAD May 14 00:48:07.133000 audit[4131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4077 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393136323665376239643436393363646363393765356363303363 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit: BPF prog-id=165 op=LOAD May 14 00:48:07.133000 audit[4131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4077 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393136323665376239643436393363646363393765356363303363 May 14 00:48:07.133000 audit: BPF prog-id=165 op=UNLOAD May 14 00:48:07.133000 audit: BPF prog-id=164 op=UNLOAD May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.133000 audit: BPF prog-id=166 op=LOAD May 14 00:48:07.133000 audit[4131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4077 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393136323665376239643436393363646363393765356363303363 May 14 00:48:07.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit: BPF prog-id=167 op=LOAD May 14 00:48:07.158000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[4162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4147 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663266643535376632653466643461396662346232643838373437 May 14 00:48:07.158000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[4162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4147 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663266643535376632653466643461396662346232643838373437 May 14 00:48:07.158000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.158000 audit: BPF prog-id=168 op=LOAD May 14 00:48:07.158000 audit[4162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4147 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663266643535376632653466643461396662346232643838373437 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit: BPF prog-id=169 op=LOAD May 14 00:48:07.159000 audit[4162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4147 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663266643535376632653466643461396662346232643838373437 May 14 00:48:07.159000 audit: BPF prog-id=169 op=UNLOAD May 14 00:48:07.159000 audit: BPF prog-id=168 op=UNLOAD May 14 00:48:07.159000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.159000 audit: BPF prog-id=170 op=LOAD May 14 00:48:07.159000 audit[4162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4147 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663266643535376632653466643461396662346232643838373437 May 14 00:48:07.162133 env[1212]: time="2025-05-14T00:48:07.161000763Z" level=info msg="StartContainer for \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\" returns successfully" May 14 00:48:07.161433 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:07.194504 env[1212]: time="2025-05-14T00:48:07.194465191Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-k84nz,Uid:427b275f-8795-4674-81ba-05adaf2dfdcc,Namespace:kube-system,Attempt:1,} returns sandbox id \"d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59\"" May 14 00:48:07.196000 kubelet[1952]: E0514 00:48:07.195909 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:07.203114 env[1212]: time="2025-05-14T00:48:07.199477637Z" level=info msg="CreateContainer within sandbox \"d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 14 00:48:07.262273 env[1212]: time="2025-05-14T00:48:07.262226454Z" level=info msg="CreateContainer within sandbox \"d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8adcfef71dd013c1f2c13cf3bf5b1c2dba2dd6f1c7978926a52f1f4fc5d35867\"" May 14 00:48:07.262986 env[1212]: time="2025-05-14T00:48:07.262951295Z" level=info msg="StartContainer for \"8adcfef71dd013c1f2c13cf3bf5b1c2dba2dd6f1c7978926a52f1f4fc5d35867\"" May 14 00:48:07.287351 systemd[1]: Started cri-containerd-8adcfef71dd013c1f2c13cf3bf5b1c2dba2dd6f1c7978926a52f1f4fc5d35867.scope. May 14 00:48:07.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.317000 audit: BPF prog-id=171 op=LOAD May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4147 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861646366656637316464303133633166326331336366336266356231 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4147 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861646366656637316464303133633166326331336366336266356231 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit: BPF prog-id=172 op=LOAD May 14 00:48:07.318000 audit[4231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4147 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861646366656637316464303133633166326331336366336266356231 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit: BPF prog-id=173 op=LOAD May 14 00:48:07.318000 audit[4231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4147 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861646366656637316464303133633166326331336366336266356231 May 14 00:48:07.318000 audit: BPF prog-id=173 op=UNLOAD May 14 00:48:07.318000 audit: BPF prog-id=172 op=UNLOAD May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { perfmon } for pid=4231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit[4231]: AVC avc: denied { bpf } for pid=4231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.318000 audit: BPF prog-id=174 op=LOAD May 14 00:48:07.318000 audit[4231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4147 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861646366656637316464303133633166326331336366336266356231 May 14 00:48:07.338849 env[1212]: time="2025-05-14T00:48:07.338781058Z" level=info msg="StartContainer for \"8adcfef71dd013c1f2c13cf3bf5b1c2dba2dd6f1c7978926a52f1f4fc5d35867\" returns successfully" May 14 00:48:07.342819 systemd-networkd[1050]: cali984b86d297c: Gained IPv6LL May 14 00:48:07.348000 audit[4243]: AVC avc: denied { getattr } for pid=4243 comm="coredns" path="cgroup:[4026532486]" dev="nsfs" ino=4026532486 scontext=system_u:system_r:svirt_lxc_net_t:s0:c277,c523 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 14 00:48:07.348000 audit[4243]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000056840 a2=40001ce578 a3=0 items=0 ppid=4147 pid=4243 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c277,c523 key=(null) May 14 00:48:07.348000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 14 00:48:07.679705 env[1212]: time="2025-05-14T00:48:07.677626613Z" level=info msg="StopPodSandbox for \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\"" May 14 00:48:07.799110 kubelet[1952]: I0514 00:48:07.799069 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:07.799625 kubelet[1952]: E0514 00:48:07.799596 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:07.800137 kubelet[1952]: E0514 00:48:07.800095 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:07.802703 kubelet[1952]: I0514 00:48:07.802621 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-645b7c96b4-9ffhl" podStartSLOduration=23.802606498 podStartE2EDuration="23.802606498s" podCreationTimestamp="2025-05-14 00:47:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:48:07.801461073 +0000 UTC m=+36.218599318" watchObservedRunningTime="2025-05-14 00:48:07.802606498 +0000 UTC m=+36.219744783" May 14 00:48:07.833000 audit[4296]: NETFILTER_CFG table=filter:99 family=2 entries=12 op=nft_register_rule pid=4296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:07.833000 audit[4296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe39ff610 a2=0 a3=1 items=0 ppid=2144 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.833000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:07.843000 audit[4296]: NETFILTER_CFG table=nat:100 family=2 entries=18 op=nft_register_rule pid=4296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:07.843000 audit[4296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5004 a0=3 a1=ffffe39ff610 a2=0 a3=1 items=0 ppid=2144 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.843000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:07.859285 kubelet[1952]: I0514 00:48:07.859227 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-k84nz" podStartSLOduration=29.859209004 podStartE2EDuration="29.859209004s" podCreationTimestamp="2025-05-14 00:47:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:48:07.818516725 +0000 UTC m=+36.235654970" watchObservedRunningTime="2025-05-14 00:48:07.859209004 +0000 UTC m=+36.276347289" May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.860 [INFO][4285] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.860 [INFO][4285] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" iface="eth0" netns="/var/run/netns/cni-f91d2ba1-e870-4202-a40d-b35e4bdd15e8" May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.861 [INFO][4285] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" iface="eth0" netns="/var/run/netns/cni-f91d2ba1-e870-4202-a40d-b35e4bdd15e8" May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.861 [INFO][4285] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" iface="eth0" netns="/var/run/netns/cni-f91d2ba1-e870-4202-a40d-b35e4bdd15e8" May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.861 [INFO][4285] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.861 [INFO][4285] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.908 [INFO][4298] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" HandleID="k8s-pod-network.895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.908 [INFO][4298] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.908 [INFO][4298] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.918 [WARNING][4298] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" HandleID="k8s-pod-network.895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.918 [INFO][4298] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" HandleID="k8s-pod-network.895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.920 [INFO][4298] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:07.925454 env[1212]: 2025-05-14 00:48:07.923 [INFO][4285] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:07.926119 env[1212]: time="2025-05-14T00:48:07.926080776Z" level=info msg="TearDown network for sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\" successfully" May 14 00:48:07.926202 env[1212]: time="2025-05-14T00:48:07.926184942Z" level=info msg="StopPodSandbox for \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\" returns successfully" May 14 00:48:07.927093 env[1212]: time="2025-05-14T00:48:07.927058512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-645b7c96b4-7lzps,Uid:07c3c723-015f-4039-b023-092360f2960b,Namespace:calico-apiserver,Attempt:1,}" May 14 00:48:08.029429 systemd[1]: run-netns-cni\x2df91d2ba1\x2de870\x2d4202\x2da40d\x2db35e4bdd15e8.mount: Deactivated successfully. May 14 00:48:08.142876 systemd-networkd[1050]: cali50439b52c1d: Link UP May 14 00:48:08.144974 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:48:08.145056 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali50439b52c1d: link becomes ready May 14 00:48:08.145307 systemd-networkd[1050]: cali50439b52c1d: Gained carrier May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:07.980 [INFO][4306] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.003 [INFO][4306] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0 calico-apiserver-645b7c96b4- calico-apiserver 07c3c723-015f-4039-b023-092360f2960b 963 0 2025-05-14 00:47:44 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:645b7c96b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-645b7c96b4-7lzps eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali50439b52c1d [] []}} ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-7lzps" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.003 [INFO][4306] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-7lzps" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.053 [INFO][4319] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" HandleID="k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.068 [INFO][4319] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" HandleID="k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000398b10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-645b7c96b4-7lzps", "timestamp":"2025-05-14 00:48:08.053784131 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.068 [INFO][4319] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.068 [INFO][4319] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.068 [INFO][4319] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.071 [INFO][4319] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" host="localhost" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.079 [INFO][4319] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.084 [INFO][4319] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.087 [INFO][4319] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.092 [INFO][4319] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.092 [INFO][4319] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" host="localhost" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.105 [INFO][4319] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.118 [INFO][4319] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" host="localhost" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.133 [INFO][4319] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" host="localhost" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.133 [INFO][4319] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" host="localhost" May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.133 [INFO][4319] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:08.202037 env[1212]: 2025-05-14 00:48:08.133 [INFO][4319] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" HandleID="k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:08.202783 env[1212]: 2025-05-14 00:48:08.135 [INFO][4306] cni-plugin/k8s.go 386: Populated endpoint ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-7lzps" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0", GenerateName:"calico-apiserver-645b7c96b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"07c3c723-015f-4039-b023-092360f2960b", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"645b7c96b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-645b7c96b4-7lzps", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali50439b52c1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:08.202783 env[1212]: 2025-05-14 00:48:08.135 [INFO][4306] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-7lzps" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:08.202783 env[1212]: 2025-05-14 00:48:08.135 [INFO][4306] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali50439b52c1d ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-7lzps" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:08.202783 env[1212]: 2025-05-14 00:48:08.146 [INFO][4306] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-7lzps" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:08.202783 env[1212]: 2025-05-14 00:48:08.146 [INFO][4306] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-7lzps" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0", GenerateName:"calico-apiserver-645b7c96b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"07c3c723-015f-4039-b023-092360f2960b", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"645b7c96b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce", Pod:"calico-apiserver-645b7c96b4-7lzps", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali50439b52c1d", MAC:"42:d8:86:53:8c:3f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:08.202783 env[1212]: 2025-05-14 00:48:08.199 [INFO][4306] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Namespace="calico-apiserver" Pod="calico-apiserver-645b7c96b4-7lzps" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:08.228562 env[1212]: time="2025-05-14T00:48:08.228427763Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:08.228562 env[1212]: time="2025-05-14T00:48:08.228518928Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:08.228562 env[1212]: time="2025-05-14T00:48:08.228530329Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:08.228977 env[1212]: time="2025-05-14T00:48:08.228929671Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce pid=4347 runtime=io.containerd.runc.v2 May 14 00:48:08.243214 systemd[1]: run-containerd-runc-k8s.io-46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce-runc.ZhIp9b.mount: Deactivated successfully. May 14 00:48:08.244879 systemd[1]: Started cri-containerd-46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce.scope. May 14 00:48:08.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.286000 audit: BPF prog-id=175 op=LOAD May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=4347 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633531663638343963353065396136373662626661313461643863 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=4347 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633531663638343963353065396136373662626661313461643863 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit: BPF prog-id=176 op=LOAD May 14 00:48:08.287000 audit[4356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=4347 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633531663638343963353065396136373662626661313461643863 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit: BPF prog-id=177 op=LOAD May 14 00:48:08.287000 audit[4356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=4347 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633531663638343963353065396136373662626661313461643863 May 14 00:48:08.287000 audit: BPF prog-id=177 op=UNLOAD May 14 00:48:08.287000 audit: BPF prog-id=176 op=UNLOAD May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.287000 audit: BPF prog-id=178 op=LOAD May 14 00:48:08.287000 audit[4356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=4347 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633531663638343963353065396136373662626661313461643863 May 14 00:48:08.290346 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:08.318461 env[1212]: time="2025-05-14T00:48:08.318410667Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-645b7c96b4-7lzps,Uid:07c3c723-015f-4039-b023-092360f2960b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce\"" May 14 00:48:08.321045 env[1212]: time="2025-05-14T00:48:08.321006731Z" level=info msg="CreateContainer within sandbox \"46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 14 00:48:08.343805 env[1212]: time="2025-05-14T00:48:08.343751750Z" level=info msg="CreateContainer within sandbox \"46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\"" May 14 00:48:08.344477 env[1212]: time="2025-05-14T00:48:08.344445909Z" level=info msg="StartContainer for \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\"" May 14 00:48:08.401709 systemd[1]: Started cri-containerd-3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79.scope. May 14 00:48:08.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.425000 audit: BPF prog-id=179 op=LOAD May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4347 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364313832336166626662613037346433353139633237643763626635 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4347 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364313832336166626662613037346433353139633237643763626635 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit: BPF prog-id=180 op=LOAD May 14 00:48:08.426000 audit[4401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4347 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364313832336166626662613037346433353139633237643763626635 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit: BPF prog-id=181 op=LOAD May 14 00:48:08.426000 audit[4401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4347 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364313832336166626662613037346433353139633237643763626635 May 14 00:48:08.426000 audit: BPF prog-id=181 op=UNLOAD May 14 00:48:08.426000 audit: BPF prog-id=180 op=UNLOAD May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.426000 audit: BPF prog-id=182 op=LOAD May 14 00:48:08.426000 audit[4401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4347 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364313832336166626662613037346433353139633237643763626635 May 14 00:48:08.494848 env[1212]: time="2025-05-14T00:48:08.494801876Z" level=info msg="StartContainer for \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\" returns successfully" May 14 00:48:08.503154 env[1212]: time="2025-05-14T00:48:08.503112736Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:08.505632 env[1212]: time="2025-05-14T00:48:08.505561792Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:08.507902 env[1212]: time="2025-05-14T00:48:08.507871040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:08.508421 env[1212]: time="2025-05-14T00:48:08.508382548Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:08.509191 env[1212]: time="2025-05-14T00:48:08.509161391Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 14 00:48:08.517849 env[1212]: time="2025-05-14T00:48:08.517806710Z" level=info msg="CreateContainer within sandbox \"33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 14 00:48:08.529070 env[1212]: time="2025-05-14T00:48:08.529021931Z" level=info msg="CreateContainer within sandbox \"33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\"" May 14 00:48:08.529646 env[1212]: time="2025-05-14T00:48:08.529610924Z" level=info msg="StartContainer for \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\"" May 14 00:48:08.557193 systemd[1]: Started cri-containerd-3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051.scope. May 14 00:48:08.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit: BPF prog-id=183 op=LOAD May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3658 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323065373933663966353333336130353434353934363230363536 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3658 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323065373933663966353333336130353434353934363230363536 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit: BPF prog-id=184 op=LOAD May 14 00:48:08.608000 audit[4453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3658 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323065373933663966353333336130353434353934363230363536 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit: BPF prog-id=185 op=LOAD May 14 00:48:08.608000 audit[4453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3658 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323065373933663966353333336130353434353934363230363536 May 14 00:48:08.608000 audit: BPF prog-id=185 op=UNLOAD May 14 00:48:08.608000 audit: BPF prog-id=184 op=UNLOAD May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:08.608000 audit: BPF prog-id=186 op=LOAD May 14 00:48:08.608000 audit[4453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3658 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323065373933663966353333336130353434353934363230363536 May 14 00:48:08.623815 systemd-networkd[1050]: cali049ce7497c7: Gained IPv6LL May 14 00:48:08.629000 audit[3921]: AVC avc: denied { watch } for pid=3921 comm="apiserver" path="/calico-apiserver-certs/..2025_05_14_00_47_52.2475207420/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c441 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c154,c441 tclass=file permissive=0 May 14 00:48:08.629000 audit[3921]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000867300 a2=fc6 a3=0 items=0 ppid=3614 pid=3921 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c441 key=(null) May 14 00:48:08.629000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 14 00:48:08.651406 env[1212]: time="2025-05-14T00:48:08.651345106Z" level=info msg="StartContainer for \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\" returns successfully" May 14 00:48:08.677240 env[1212]: time="2025-05-14T00:48:08.677114493Z" level=info msg="StopPodSandbox for \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\"" May 14 00:48:08.729000 audit[4153]: AVC avc: denied { watch } for pid=4153 comm="apiserver" path="/calico-apiserver-certs/..2025_05_14_00_47_52.2231846987/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c54,c616 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c54,c616 tclass=file permissive=0 May 14 00:48:08.729000 audit[4153]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4001276880 a2=fc6 a3=0 items=0 ppid=4077 pid=4153 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c54,c616 key=(null) May 14 00:48:08.729000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.751 [INFO][4500] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.751 [INFO][4500] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" iface="eth0" netns="/var/run/netns/cni-39680351-fec2-0e9c-7928-a58ed5adf2f5" May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.752 [INFO][4500] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" iface="eth0" netns="/var/run/netns/cni-39680351-fec2-0e9c-7928-a58ed5adf2f5" May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.752 [INFO][4500] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" iface="eth0" netns="/var/run/netns/cni-39680351-fec2-0e9c-7928-a58ed5adf2f5" May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.752 [INFO][4500] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.752 [INFO][4500] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.780 [INFO][4512] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" HandleID="k8s-pod-network.f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.780 [INFO][4512] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.780 [INFO][4512] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.790 [WARNING][4512] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" HandleID="k8s-pod-network.f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.790 [INFO][4512] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" HandleID="k8s-pod-network.f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.792 [INFO][4512] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:08.797014 env[1212]: 2025-05-14 00:48:08.794 [INFO][4500] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:08.797680 env[1212]: time="2025-05-14T00:48:08.797142140Z" level=info msg="TearDown network for sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\" successfully" May 14 00:48:08.797680 env[1212]: time="2025-05-14T00:48:08.797172982Z" level=info msg="StopPodSandbox for \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\" returns successfully" May 14 00:48:08.798132 env[1212]: time="2025-05-14T00:48:08.798100593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9mq7g,Uid:c9b4d85b-ed70-4abb-84fe-dbae253e2eb2,Namespace:calico-system,Attempt:1,}" May 14 00:48:08.808637 kubelet[1952]: I0514 00:48:08.808538 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:08.809091 kubelet[1952]: E0514 00:48:08.809055 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:08.809372 kubelet[1952]: E0514 00:48:08.809316 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:08.839058 kubelet[1952]: I0514 00:48:08.838975 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-645b7c96b4-7lzps" podStartSLOduration=24.838955056 podStartE2EDuration="24.838955056s" podCreationTimestamp="2025-05-14 00:47:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:48:08.827022395 +0000 UTC m=+37.244160640" watchObservedRunningTime="2025-05-14 00:48:08.838955056 +0000 UTC m=+37.256093301" May 14 00:48:08.852000 audit[4536]: NETFILTER_CFG table=filter:101 family=2 entries=12 op=nft_register_rule pid=4536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:08.852000 audit[4536]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffdbfc83f0 a2=0 a3=1 items=0 ppid=2144 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.852000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:08.865000 audit[4536]: NETFILTER_CFG table=nat:102 family=2 entries=54 op=nft_register_chain pid=4536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:08.865000 audit[4536]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19092 a0=3 a1=ffffdbfc83f0 a2=0 a3=1 items=0 ppid=2144 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.865000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:08.934037 systemd-networkd[1050]: cali3fbcb64e7d2: Link UP May 14 00:48:08.936121 systemd-networkd[1050]: cali3fbcb64e7d2: Gained carrier May 14 00:48:08.936593 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3fbcb64e7d2: link becomes ready May 14 00:48:08.946908 kubelet[1952]: I0514 00:48:08.946776 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-8656ccb584-l42f8" podStartSLOduration=20.727509526 podStartE2EDuration="24.946754786s" podCreationTimestamp="2025-05-14 00:47:44 +0000 UTC" firstStartedPulling="2025-05-14 00:48:04.290668373 +0000 UTC m=+32.707806618" lastFinishedPulling="2025-05-14 00:48:08.509913633 +0000 UTC m=+36.927051878" observedRunningTime="2025-05-14 00:48:08.840752116 +0000 UTC m=+37.257890361" watchObservedRunningTime="2025-05-14 00:48:08.946754786 +0000 UTC m=+37.363893031" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.845 [INFO][4521] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.864 [INFO][4521] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--9mq7g-eth0 csi-node-driver- calico-system c9b4d85b-ed70-4abb-84fe-dbae253e2eb2 982 0 2025-05-14 00:47:44 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-9mq7g eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali3fbcb64e7d2 [] []}} ContainerID="c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" Namespace="calico-system" Pod="csi-node-driver-9mq7g" WorkloadEndpoint="localhost-k8s-csi--node--driver--9mq7g-" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.864 [INFO][4521] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" Namespace="calico-system" Pod="csi-node-driver-9mq7g" WorkloadEndpoint="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.895 [INFO][4539] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" HandleID="k8s-pod-network.c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.906 [INFO][4539] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" HandleID="k8s-pod-network.c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000133760), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-9mq7g", "timestamp":"2025-05-14 00:48:08.895240853 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.906 [INFO][4539] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.906 [INFO][4539] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.906 [INFO][4539] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.908 [INFO][4539] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" host="localhost" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.912 [INFO][4539] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.916 [INFO][4539] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.917 [INFO][4539] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.919 [INFO][4539] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.919 [INFO][4539] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" host="localhost" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.921 [INFO][4539] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42 May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.924 [INFO][4539] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" host="localhost" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.930 [INFO][4539] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" host="localhost" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.930 [INFO][4539] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" host="localhost" May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.930 [INFO][4539] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:08.951105 env[1212]: 2025-05-14 00:48:08.930 [INFO][4539] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" HandleID="k8s-pod-network.c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:08.951859 env[1212]: 2025-05-14 00:48:08.932 [INFO][4521] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" Namespace="calico-system" Pod="csi-node-driver-9mq7g" WorkloadEndpoint="localhost-k8s-csi--node--driver--9mq7g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--9mq7g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c9b4d85b-ed70-4abb-84fe-dbae253e2eb2", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-9mq7g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3fbcb64e7d2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:08.951859 env[1212]: 2025-05-14 00:48:08.932 [INFO][4521] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.135/32] ContainerID="c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" Namespace="calico-system" Pod="csi-node-driver-9mq7g" WorkloadEndpoint="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:08.951859 env[1212]: 2025-05-14 00:48:08.932 [INFO][4521] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3fbcb64e7d2 ContainerID="c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" Namespace="calico-system" Pod="csi-node-driver-9mq7g" WorkloadEndpoint="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:08.951859 env[1212]: 2025-05-14 00:48:08.936 [INFO][4521] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" Namespace="calico-system" Pod="csi-node-driver-9mq7g" WorkloadEndpoint="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:08.951859 env[1212]: 2025-05-14 00:48:08.936 [INFO][4521] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" Namespace="calico-system" Pod="csi-node-driver-9mq7g" WorkloadEndpoint="localhost-k8s-csi--node--driver--9mq7g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--9mq7g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c9b4d85b-ed70-4abb-84fe-dbae253e2eb2", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42", Pod:"csi-node-driver-9mq7g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3fbcb64e7d2", MAC:"2e:68:f8:85:95:ea", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:08.951859 env[1212]: 2025-05-14 00:48:08.948 [INFO][4521] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42" Namespace="calico-system" Pod="csi-node-driver-9mq7g" WorkloadEndpoint="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:08.961782 env[1212]: time="2025-05-14T00:48:08.961696334Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:08.961890 env[1212]: time="2025-05-14T00:48:08.961761337Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:08.961890 env[1212]: time="2025-05-14T00:48:08.961772258Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:08.961988 env[1212]: time="2025-05-14T00:48:08.961914866Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42 pid=4564 runtime=io.containerd.runc.v2 May 14 00:48:08.974885 systemd[1]: Started cri-containerd-c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42.scope. May 14 00:48:09.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.000000 audit: BPF prog-id=187 op=LOAD May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4564 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:09.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334623333663739623032613161363664316238326465343634353834 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4564 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:09.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334623333663739623032613161363664316238326465343634353834 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit: BPF prog-id=188 op=LOAD May 14 00:48:09.001000 audit[4574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4564 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:09.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334623333663739623032613161363664316238326465343634353834 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit: BPF prog-id=189 op=LOAD May 14 00:48:09.001000 audit[4574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4564 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:09.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334623333663739623032613161363664316238326465343634353834 May 14 00:48:09.001000 audit: BPF prog-id=189 op=UNLOAD May 14 00:48:09.001000 audit: BPF prog-id=188 op=UNLOAD May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:09.001000 audit: BPF prog-id=190 op=LOAD May 14 00:48:09.001000 audit[4574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4564 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:09.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334623333663739623032613161363664316238326465343634353834 May 14 00:48:09.003875 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:09.019540 env[1212]: time="2025-05-14T00:48:09.019484507Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9mq7g,Uid:c9b4d85b-ed70-4abb-84fe-dbae253e2eb2,Namespace:calico-system,Attempt:1,} returns sandbox id \"c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42\"" May 14 00:48:09.023569 env[1212]: time="2025-05-14T00:48:09.022576033Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 14 00:48:09.031063 systemd[1]: run-netns-cni\x2d39680351\x2dfec2\x2d0e9c\x2d7928\x2da58ed5adf2f5.mount: Deactivated successfully. May 14 00:48:09.134529 systemd-networkd[1050]: cali5ee21d42c09: Gained IPv6LL May 14 00:48:09.811753 kubelet[1952]: E0514 00:48:09.811721 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:09.812121 kubelet[1952]: I0514 00:48:09.812092 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:09.812386 kubelet[1952]: I0514 00:48:09.812364 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:09.838523 systemd-networkd[1050]: cali50439b52c1d: Gained IPv6LL May 14 00:48:10.149067 kubelet[1952]: I0514 00:48:10.148917 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:10.149413 kubelet[1952]: E0514 00:48:10.149221 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:10.182415 env[1212]: time="2025-05-14T00:48:10.182349963Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:10.188093 env[1212]: time="2025-05-14T00:48:10.188051582Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:10.190073 env[1212]: time="2025-05-14T00:48:10.190028286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:10.192805 env[1212]: time="2025-05-14T00:48:10.192764869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:10.193455 env[1212]: time="2025-05-14T00:48:10.193422824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 14 00:48:10.195780 env[1212]: time="2025-05-14T00:48:10.195745546Z" level=info msg="CreateContainer within sandbox \"c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 14 00:48:10.202000 audit[4626]: NETFILTER_CFG table=filter:103 family=2 entries=11 op=nft_register_rule pid=4626 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:10.205497 kernel: kauditd_printk_skb: 778 callbacks suppressed May 14 00:48:10.205563 kernel: audit: type=1325 audit(1747183690.202:1280): table=filter:103 family=2 entries=11 op=nft_register_rule pid=4626 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:10.202000 audit[4626]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe4274410 a2=0 a3=1 items=0 ppid=2144 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.211858 kernel: audit: type=1300 audit(1747183690.202:1280): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe4274410 a2=0 a3=1 items=0 ppid=2144 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:10.217478 env[1212]: time="2025-05-14T00:48:10.217434723Z" level=info msg="CreateContainer within sandbox \"c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d0d3a42da2af0f5f67c5b4e1b6610bb3ce056f3d4f8ed5a71ea3d3eeece3cd29\"" May 14 00:48:10.214000 audit[4626]: NETFILTER_CFG table=nat:104 family=2 entries=25 op=nft_register_chain pid=4626 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:10.218267 env[1212]: time="2025-05-14T00:48:10.218169241Z" level=info msg="StartContainer for \"d0d3a42da2af0f5f67c5b4e1b6610bb3ce056f3d4f8ed5a71ea3d3eeece3cd29\"" May 14 00:48:10.220263 kernel: audit: type=1327 audit(1747183690.202:1280): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:10.220354 kernel: audit: type=1325 audit(1747183690.214:1281): table=nat:104 family=2 entries=25 op=nft_register_chain pid=4626 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:10.220379 kernel: audit: type=1300 audit(1747183690.214:1281): arch=c00000b7 syscall=211 success=yes exit=8580 a0=3 a1=ffffe4274410 a2=0 a3=1 items=0 ppid=2144 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.214000 audit[4626]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8580 a0=3 a1=ffffe4274410 a2=0 a3=1 items=0 ppid=2144 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:10.227087 kernel: audit: type=1327 audit(1747183690.214:1281): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:10.243099 systemd[1]: Started cri-containerd-d0d3a42da2af0f5f67c5b4e1b6610bb3ce056f3d4f8ed5a71ea3d3eeece3cd29.scope. May 14 00:48:10.265000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.265000 audit[4636]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4564 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.273895 kernel: audit: type=1400 audit(1747183690.265:1282): avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.273999 kernel: audit: type=1300 audit(1747183690.265:1282): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4564 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.274099 kernel: audit: type=1327 audit(1747183690.265:1282): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643361343264613261663066356636376335623465316236363130 May 14 00:48:10.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643361343264613261663066356636376335623465316236363130 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.280034 kernel: audit: type=1400 audit(1747183690.268:1283): avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit: BPF prog-id=191 op=LOAD May 14 00:48:10.268000 audit[4636]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4564 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643361343264613261663066356636376335623465316236363130 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.268000 audit: BPF prog-id=192 op=LOAD May 14 00:48:10.268000 audit[4636]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4564 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643361343264613261663066356636376335623465316236363130 May 14 00:48:10.274000 audit: BPF prog-id=192 op=UNLOAD May 14 00:48:10.274000 audit: BPF prog-id=191 op=UNLOAD May 14 00:48:10.274000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.274000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.274000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.274000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.274000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.274000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.274000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.274000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.274000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.274000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:10.274000 audit: BPF prog-id=193 op=LOAD May 14 00:48:10.274000 audit[4636]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4564 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643361343264613261663066356636376335623465316236363130 May 14 00:48:10.305532 env[1212]: time="2025-05-14T00:48:10.305464219Z" level=info msg="StartContainer for \"d0d3a42da2af0f5f67c5b4e1b6610bb3ce056f3d4f8ed5a71ea3d3eeece3cd29\" returns successfully" May 14 00:48:10.308310 env[1212]: time="2025-05-14T00:48:10.308267646Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 14 00:48:10.414512 systemd-networkd[1050]: cali3fbcb64e7d2: Gained IPv6LL May 14 00:48:10.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.97:22-10.0.0.1:49834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:10.588686 systemd[1]: Started sshd@9-10.0.0.97:22-10.0.0.1:49834.service. May 14 00:48:10.639000 audit[4688]: USER_ACCT pid=4688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:10.640174 sshd[4688]: Accepted publickey for core from 10.0.0.1 port 49834 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:10.641000 audit[4688]: CRED_ACQ pid=4688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:10.641000 audit[4688]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcceaf050 a2=3 a3=1 items=0 ppid=1 pid=4688 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.641000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:10.642568 sshd[4688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:10.647492 systemd[1]: Started session-10.scope. May 14 00:48:10.647958 systemd-logind[1200]: New session 10 of user core. May 14 00:48:10.652000 audit[4688]: USER_START pid=4688 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:10.653000 audit[4710]: CRED_ACQ pid=4710 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:10.816106 kubelet[1952]: E0514 00:48:10.816080 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:10.843738 sshd[4688]: pam_unix(sshd:session): session closed for user core May 14 00:48:10.845000 audit[4688]: USER_END pid=4688 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:10.845000 audit[4688]: CRED_DISP pid=4688 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:10.851294 systemd[1]: Started sshd@10-10.0.0.97:22-10.0.0.1:49842.service. May 14 00:48:10.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.97:22-10.0.0.1:49842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:10.852768 systemd-logind[1200]: Session 10 logged out. Waiting for processes to exit. May 14 00:48:10.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.97:22-10.0.0.1:49834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:10.853740 systemd[1]: sshd@9-10.0.0.97:22-10.0.0.1:49834.service: Deactivated successfully. May 14 00:48:10.854520 systemd[1]: session-10.scope: Deactivated successfully. May 14 00:48:10.855173 systemd-logind[1200]: Removed session 10. May 14 00:48:10.894000 audit[4723]: USER_ACCT pid=4723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:10.895221 sshd[4723]: Accepted publickey for core from 10.0.0.1 port 49842 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:10.895000 audit[4723]: CRED_ACQ pid=4723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:10.896000 audit[4723]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2cfc300 a2=3 a3=1 items=0 ppid=1 pid=4723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.896000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:10.897062 sshd[4723]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:10.905425 systemd[1]: Started session-11.scope. May 14 00:48:10.906118 systemd-logind[1200]: New session 11 of user core. May 14 00:48:10.910000 audit[4723]: USER_START pid=4723 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:10.911000 audit[4726]: CRED_ACQ pid=4726 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:11.063000 audit[4418]: AVC avc: denied { watch } for pid=4418 comm="apiserver" path="/calico-apiserver-certs/..2025_05_14_00_47_52.3958885547/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c172 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c62,c172 tclass=file permissive=0 May 14 00:48:11.063000 audit[4418]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40013d3860 a2=fc6 a3=0 items=0 ppid=4347 pid=4418 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c172 key=(null) May 14 00:48:11.063000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 14 00:48:11.094171 sshd[4723]: pam_unix(sshd:session): session closed for user core May 14 00:48:11.094000 audit[4723]: USER_END pid=4723 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:11.096000 audit[4723]: CRED_DISP pid=4723 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:11.098158 systemd[1]: Started sshd@11-10.0.0.97:22-10.0.0.1:49848.service. May 14 00:48:11.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.97:22-10.0.0.1:49848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:11.099740 systemd-logind[1200]: Session 11 logged out. Waiting for processes to exit. May 14 00:48:11.100485 systemd[1]: sshd@10-10.0.0.97:22-10.0.0.1:49842.service: Deactivated successfully. May 14 00:48:11.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.97:22-10.0.0.1:49842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:11.101161 systemd[1]: session-11.scope: Deactivated successfully. May 14 00:48:11.101810 systemd-logind[1200]: Removed session 11. May 14 00:48:11.140000 audit[4741]: USER_ACCT pid=4741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:11.141629 sshd[4741]: Accepted publickey for core from 10.0.0.1 port 49848 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:11.142000 audit[4741]: CRED_ACQ pid=4741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:11.142000 audit[4741]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee6dd560 a2=3 a3=1 items=0 ppid=1 pid=4741 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.142000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:11.143223 sshd[4741]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:11.146443 systemd-logind[1200]: New session 12 of user core. May 14 00:48:11.147238 systemd[1]: Started session-12.scope. May 14 00:48:11.151000 audit[4741]: USER_START pid=4741 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:11.152000 audit[4744]: CRED_ACQ pid=4744 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit: BPF prog-id=194 op=LOAD May 14 00:48:11.192000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff1de5298 a2=98 a3=fffff1de5288 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.192000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.192000 audit: BPF prog-id=194 op=UNLOAD May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit: BPF prog-id=195 op=LOAD May 14 00:48:11.192000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff1de4f28 a2=74 a3=95 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.192000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.192000 audit: BPF prog-id=195 op=UNLOAD May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.192000 audit: BPF prog-id=196 op=LOAD May 14 00:48:11.192000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff1de4f88 a2=94 a3=2 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.192000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.192000 audit: BPF prog-id=196 op=UNLOAD May 14 00:48:11.276000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.276000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.276000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.276000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.276000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.276000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.276000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.276000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.276000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.276000 audit: BPF prog-id=197 op=LOAD May 14 00:48:11.276000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff1de4f48 a2=40 a3=fffff1de4f78 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.276000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.276000 audit: BPF prog-id=197 op=UNLOAD May 14 00:48:11.276000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.276000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff1de5060 a2=50 a3=0 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.276000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff1de4fb8 a2=28 a3=fffff1de50e8 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff1de4fe8 a2=28 a3=fffff1de5118 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff1de4e98 a2=28 a3=fffff1de4fc8 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff1de5008 a2=28 a3=fffff1de5138 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff1de4fe8 a2=28 a3=fffff1de5118 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff1de4fd8 a2=28 a3=fffff1de5108 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff1de5008 a2=28 a3=fffff1de5138 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff1de4fe8 a2=28 a3=fffff1de5118 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff1de5008 a2=28 a3=fffff1de5138 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff1de4fd8 a2=28 a3=fffff1de5108 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff1de5058 a2=28 a3=fffff1de5198 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff1de4d90 a2=50 a3=0 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit: BPF prog-id=198 op=LOAD May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff1de4d98 a2=94 a3=5 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit: BPF prog-id=198 op=UNLOAD May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff1de4ea0 a2=50 a3=0 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff1de4fe8 a2=4 a3=3 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.285000 audit[4756]: AVC avc: denied { confidentiality } for pid=4756 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:11.285000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff1de4fc8 a2=94 a3=6 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.286000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { confidentiality } for pid=4756 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:11.286000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff1de4798 a2=94 a3=83 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.286000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.286000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.286000 audit[4756]: AVC avc: denied { confidentiality } for pid=4756 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:11.286000 audit[4756]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff1de4798 a2=94 a3=83 items=0 ppid=4733 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.286000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit: BPF prog-id=199 op=LOAD May 14 00:48:11.319000 audit[4767]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc317688 a2=98 a3=ffffcc317678 items=0 ppid=4733 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.319000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:11.319000 audit: BPF prog-id=199 op=UNLOAD May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit: BPF prog-id=200 op=LOAD May 14 00:48:11.319000 audit[4767]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc317538 a2=74 a3=95 items=0 ppid=4733 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.319000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:11.319000 audit: BPF prog-id=200 op=UNLOAD May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.319000 audit: BPF prog-id=201 op=LOAD May 14 00:48:11.319000 audit[4767]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc317568 a2=40 a3=ffffcc317598 items=0 ppid=4733 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.319000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:11.320000 audit: BPF prog-id=201 op=UNLOAD May 14 00:48:11.349934 sshd[4741]: pam_unix(sshd:session): session closed for user core May 14 00:48:11.351000 audit[4741]: USER_END pid=4741 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:11.351000 audit[4741]: CRED_DISP pid=4741 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:11.355604 systemd[1]: sshd@11-10.0.0.97:22-10.0.0.1:49848.service: Deactivated successfully. May 14 00:48:11.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.97:22-10.0.0.1:49848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:11.356366 systemd[1]: session-12.scope: Deactivated successfully. May 14 00:48:11.356932 systemd-logind[1200]: Session 12 logged out. Waiting for processes to exit. May 14 00:48:11.357717 systemd-logind[1200]: Removed session 12. May 14 00:48:11.404895 systemd-networkd[1050]: vxlan.calico: Link UP May 14 00:48:11.404912 systemd-networkd[1050]: vxlan.calico: Gained carrier May 14 00:48:11.427000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit: BPF prog-id=202 op=LOAD May 14 00:48:11.427000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcfac7b08 a2=98 a3=ffffcfac7af8 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.427000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.427000 audit: BPF prog-id=202 op=UNLOAD May 14 00:48:11.427000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.427000 audit: BPF prog-id=203 op=LOAD May 14 00:48:11.427000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcfac77e8 a2=74 a3=95 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.427000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit: BPF prog-id=203 op=UNLOAD May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit: BPF prog-id=204 op=LOAD May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcfac7848 a2=94 a3=2 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit: BPF prog-id=204 op=UNLOAD May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfac7878 a2=28 a3=ffffcfac79a8 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfac78a8 a2=28 a3=ffffcfac79d8 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfac7758 a2=28 a3=ffffcfac7888 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfac78c8 a2=28 a3=ffffcfac79f8 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfac78a8 a2=28 a3=ffffcfac79d8 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfac7898 a2=28 a3=ffffcfac79c8 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfac78c8 a2=28 a3=ffffcfac79f8 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfac78a8 a2=28 a3=ffffcfac79d8 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfac78c8 a2=28 a3=ffffcfac79f8 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfac7898 a2=28 a3=ffffcfac79c8 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfac7918 a2=28 a3=ffffcfac7a58 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit: BPF prog-id=205 op=LOAD May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcfac7738 a2=40 a3=ffffcfac7768 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit: BPF prog-id=205 op=UNLOAD May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffcfac7760 a2=50 a3=0 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.428000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.428000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffcfac7760 a2=50 a3=0 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit: BPF prog-id=206 op=LOAD May 14 00:48:11.429000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcfac6ec8 a2=94 a3=2 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.429000 audit: BPF prog-id=206 op=UNLOAD May 14 00:48:11.429000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.429000 audit: BPF prog-id=207 op=LOAD May 14 00:48:11.429000 audit[4792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcfac7058 a2=94 a3=30 items=0 ppid=4733 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit: BPF prog-id=208 op=LOAD May 14 00:48:11.435000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffff052a38 a2=98 a3=ffffff052a28 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.435000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.435000 audit: BPF prog-id=208 op=UNLOAD May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit: BPF prog-id=209 op=LOAD May 14 00:48:11.435000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffff0526c8 a2=74 a3=95 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.435000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.435000 audit: BPF prog-id=209 op=UNLOAD May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.435000 audit: BPF prog-id=210 op=LOAD May 14 00:48:11.435000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffff052728 a2=94 a3=2 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.435000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.435000 audit: BPF prog-id=210 op=UNLOAD May 14 00:48:11.520000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.520000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.520000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.520000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.520000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.520000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.520000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.520000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.520000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.520000 audit: BPF prog-id=211 op=LOAD May 14 00:48:11.520000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffff0526e8 a2=40 a3=ffffff052718 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.520000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.520000 audit: BPF prog-id=211 op=UNLOAD May 14 00:48:11.520000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.520000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffff052800 a2=50 a3=0 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.520000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffff052758 a2=28 a3=ffffff052888 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff052788 a2=28 a3=ffffff0528b8 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff052638 a2=28 a3=ffffff052768 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffff0527a8 a2=28 a3=ffffff0528d8 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffff052788 a2=28 a3=ffffff0528b8 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffff052778 a2=28 a3=ffffff0528a8 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffff0527a8 a2=28 a3=ffffff0528d8 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff052788 a2=28 a3=ffffff0528b8 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff0527a8 a2=28 a3=ffffff0528d8 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff052778 a2=28 a3=ffffff0528a8 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffff0527f8 a2=28 a3=ffffff052938 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffff052530 a2=50 a3=0 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit: BPF prog-id=212 op=LOAD May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffff052538 a2=94 a3=5 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit: BPF prog-id=212 op=UNLOAD May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffff052640 a2=50 a3=0 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffff052788 a2=4 a3=3 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { confidentiality } for pid=4796 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffff052768 a2=94 a3=6 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.529000 audit[4796]: AVC avc: denied { confidentiality } for pid=4796 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:11.529000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffff051f38 a2=94 a3=83 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { confidentiality } for pid=4796 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:11.530000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffff051f38 a2=94 a3=83 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffff053978 a2=10 a3=ffffff053a68 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffff053838 a2=10 a3=ffffff053928 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffff0537a8 a2=10 a3=ffffff053928 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.530000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.530000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffff0537a8 a2=10 a3=ffffff053928 items=0 ppid=4733 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:11.546491 env[1212]: time="2025-05-14T00:48:11.546449682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:11.548427 env[1212]: time="2025-05-14T00:48:11.548384021Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:11.549000 audit: BPF prog-id=207 op=UNLOAD May 14 00:48:11.549706 env[1212]: time="2025-05-14T00:48:11.549681007Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:11.551556 env[1212]: time="2025-05-14T00:48:11.551527742Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:11.552001 env[1212]: time="2025-05-14T00:48:11.551971324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 14 00:48:11.554588 env[1212]: time="2025-05-14T00:48:11.554542576Z" level=info msg="CreateContainer within sandbox \"c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 14 00:48:11.570806 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3239732397.mount: Deactivated successfully. May 14 00:48:11.577303 env[1212]: time="2025-05-14T00:48:11.577252816Z" level=info msg="CreateContainer within sandbox \"c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"8a19bb7fc12aa994af3f40c692e3a306340703ab5e3b5fb9fbc4e97518bea9dd\"" May 14 00:48:11.577953 env[1212]: time="2025-05-14T00:48:11.577901329Z" level=info msg="StartContainer for \"8a19bb7fc12aa994af3f40c692e3a306340703ab5e3b5fb9fbc4e97518bea9dd\"" May 14 00:48:11.598880 systemd[1]: Started cri-containerd-8a19bb7fc12aa994af3f40c692e3a306340703ab5e3b5fb9fbc4e97518bea9dd.scope. May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4564 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313962623766633132616139393461663366343063363932653361 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit: BPF prog-id=213 op=LOAD May 14 00:48:11.624000 audit[4829]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4564 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313962623766633132616139393461663366343063363932653361 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit: BPF prog-id=214 op=LOAD May 14 00:48:11.624000 audit[4829]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4564 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313962623766633132616139393461663366343063363932653361 May 14 00:48:11.624000 audit: BPF prog-id=214 op=UNLOAD May 14 00:48:11.624000 audit: BPF prog-id=213 op=UNLOAD May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:11.624000 audit: BPF prog-id=215 op=LOAD May 14 00:48:11.624000 audit[4829]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4564 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313962623766633132616139393461663366343063363932653361 May 14 00:48:11.636000 audit[4857]: NETFILTER_CFG table=mangle:105 family=2 entries=16 op=nft_register_chain pid=4857 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:11.636000 audit[4857]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd80f0dd0 a2=0 a3=ffff99ef6fa8 items=0 ppid=4733 pid=4857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.636000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:11.644000 audit[4858]: NETFILTER_CFG table=nat:106 family=2 entries=15 op=nft_register_chain pid=4858 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:11.644000 audit[4858]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffffe2c39f0 a2=0 a3=ffffa5bf3fa8 items=0 ppid=4733 pid=4858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.644000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:11.647000 audit[4861]: NETFILTER_CFG table=filter:107 family=2 entries=247 op=nft_register_chain pid=4861 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:11.647000 audit[4861]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=146052 a0=3 a1=ffffe7665c30 a2=0 a3=ffffa201dfa8 items=0 ppid=4733 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.647000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:11.654000 audit[4859]: NETFILTER_CFG table=raw:108 family=2 entries=21 op=nft_register_chain pid=4859 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:11.654000 audit[4859]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe4913620 a2=0 a3=ffffa5bbafa8 items=0 ppid=4733 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:11.654000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:11.663608 env[1212]: time="2025-05-14T00:48:11.663564147Z" level=info msg="StartContainer for \"8a19bb7fc12aa994af3f40c692e3a306340703ab5e3b5fb9fbc4e97518bea9dd\" returns successfully" May 14 00:48:11.733730 kubelet[1952]: I0514 00:48:11.733680 1952 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 14 00:48:11.733730 kubelet[1952]: I0514 00:48:11.733729 1952 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 14 00:48:11.830416 kubelet[1952]: I0514 00:48:11.829839 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-9mq7g" podStartSLOduration=25.298892272 podStartE2EDuration="27.829823923s" podCreationTimestamp="2025-05-14 00:47:44 +0000 UTC" firstStartedPulling="2025-05-14 00:48:09.022199693 +0000 UTC m=+37.439337938" lastFinishedPulling="2025-05-14 00:48:11.553131344 +0000 UTC m=+39.970269589" observedRunningTime="2025-05-14 00:48:11.829433143 +0000 UTC m=+40.246571388" watchObservedRunningTime="2025-05-14 00:48:11.829823923 +0000 UTC m=+40.246962168" May 14 00:48:12.188240 kubelet[1952]: I0514 00:48:12.187858 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:12.654605 systemd-networkd[1050]: vxlan.calico: Gained IPv6LL May 14 00:48:13.882625 kubelet[1952]: I0514 00:48:13.882557 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:13.925000 audit[4933]: NETFILTER_CFG table=filter:109 family=2 entries=9 op=nft_register_rule pid=4933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:13.925000 audit[4933]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff6c04c30 a2=0 a3=1 items=0 ppid=2144 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:13.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:13.937000 audit[4933]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=4933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:13.937000 audit[4933]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffff6c04c30 a2=0 a3=1 items=0 ppid=2144 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:13.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:16.354838 systemd[1]: Started sshd@12-10.0.0.97:22-10.0.0.1:60256.service. May 14 00:48:16.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.97:22-10.0.0.1:60256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:16.356010 kernel: kauditd_printk_skb: 604 callbacks suppressed May 14 00:48:16.356143 kernel: audit: type=1130 audit(1747183696.354:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.97:22-10.0.0.1:60256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:16.397000 audit[4935]: USER_ACCT pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.398573 sshd[4935]: Accepted publickey for core from 10.0.0.1 port 60256 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:16.399778 sshd[4935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:16.398000 audit[4935]: CRED_ACQ pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.404916 kernel: audit: type=1101 audit(1747183696.397:1420): pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.404979 kernel: audit: type=1103 audit(1747183696.398:1421): pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.407195 kernel: audit: type=1006 audit(1747183696.398:1422): pid=4935 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 14 00:48:16.407261 kernel: audit: type=1300 audit(1747183696.398:1422): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeeb0e140 a2=3 a3=1 items=0 ppid=1 pid=4935 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:16.398000 audit[4935]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeeb0e140 a2=3 a3=1 items=0 ppid=1 pid=4935 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:16.407595 systemd[1]: Started session-13.scope. May 14 00:48:16.407850 systemd-logind[1200]: New session 13 of user core. May 14 00:48:16.410625 kernel: audit: type=1327 audit(1747183696.398:1422): proctitle=737368643A20636F7265205B707269765D May 14 00:48:16.398000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:16.410000 audit[4935]: USER_START pid=4935 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.415053 kernel: audit: type=1105 audit(1747183696.410:1423): pid=4935 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.415000 audit[4937]: CRED_ACQ pid=4937 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.419413 kernel: audit: type=1103 audit(1747183696.415:1424): pid=4937 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.560087 sshd[4935]: pam_unix(sshd:session): session closed for user core May 14 00:48:16.560000 audit[4935]: USER_END pid=4935 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.564868 systemd[1]: sshd@12-10.0.0.97:22-10.0.0.1:60256.service: Deactivated successfully. May 14 00:48:16.563000 audit[4935]: CRED_DISP pid=4935 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.565730 systemd[1]: session-13.scope: Deactivated successfully. May 14 00:48:16.568008 kernel: audit: type=1106 audit(1747183696.560:1425): pid=4935 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.568059 kernel: audit: type=1104 audit(1747183696.563:1426): pid=4935 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:16.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.97:22-10.0.0.1:60256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:16.568508 systemd-logind[1200]: Session 13 logged out. Waiting for processes to exit. May 14 00:48:16.569208 systemd-logind[1200]: Removed session 13. May 14 00:48:21.565033 systemd[1]: Started sshd@13-10.0.0.97:22-10.0.0.1:60264.service. May 14 00:48:21.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.97:22-10.0.0.1:60264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:21.566003 kernel: kauditd_printk_skb: 1 callbacks suppressed May 14 00:48:21.566055 kernel: audit: type=1130 audit(1747183701.563:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.97:22-10.0.0.1:60264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:21.601000 audit[4956]: USER_ACCT pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.602968 sshd[4956]: Accepted publickey for core from 10.0.0.1 port 60264 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:21.604382 sshd[4956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:21.602000 audit[4956]: CRED_ACQ pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.609248 kernel: audit: type=1101 audit(1747183701.601:1429): pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.609308 kernel: audit: type=1103 audit(1747183701.602:1430): pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.611421 kernel: audit: type=1006 audit(1747183701.602:1431): pid=4956 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 14 00:48:21.611485 kernel: audit: type=1300 audit(1747183701.602:1431): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb061800 a2=3 a3=1 items=0 ppid=1 pid=4956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:21.602000 audit[4956]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb061800 a2=3 a3=1 items=0 ppid=1 pid=4956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:21.611606 systemd-logind[1200]: New session 14 of user core. May 14 00:48:21.611859 systemd[1]: Started session-14.scope. May 14 00:48:21.602000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:21.615787 kernel: audit: type=1327 audit(1747183701.602:1431): proctitle=737368643A20636F7265205B707269765D May 14 00:48:21.615847 kernel: audit: type=1105 audit(1747183701.613:1432): pid=4956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.613000 audit[4956]: USER_START pid=4956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.618000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.622629 kernel: audit: type=1103 audit(1747183701.618:1433): pid=4958 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.740971 sshd[4956]: pam_unix(sshd:session): session closed for user core May 14 00:48:21.740000 audit[4956]: USER_END pid=4956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.744124 systemd[1]: sshd@13-10.0.0.97:22-10.0.0.1:60264.service: Deactivated successfully. May 14 00:48:21.745006 systemd[1]: session-14.scope: Deactivated successfully. May 14 00:48:21.745520 systemd-logind[1200]: Session 14 logged out. Waiting for processes to exit. May 14 00:48:21.740000 audit[4956]: CRED_DISP pid=4956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.746332 systemd-logind[1200]: Removed session 14. May 14 00:48:21.748765 kernel: audit: type=1106 audit(1747183701.740:1434): pid=4956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.748812 kernel: audit: type=1104 audit(1747183701.740:1435): pid=4956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:21.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.97:22-10.0.0.1:60264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:23.726188 kubelet[1952]: I0514 00:48:23.726137 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:23.763000 audit[4978]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.763000 audit[4978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc3c5af70 a2=0 a3=1 items=0 ppid=2144 pid=4978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.763000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:23.775000 audit[4978]: NETFILTER_CFG table=nat:112 family=2 entries=34 op=nft_register_chain pid=4978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.775000 audit[4978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffc3c5af70 a2=0 a3=1 items=0 ppid=2144 pid=4978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:23.777308 kubelet[1952]: I0514 00:48:23.777019 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:23.778044 env[1212]: time="2025-05-14T00:48:23.777991575Z" level=info msg="StopContainer for \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\" with timeout 30 (s)" May 14 00:48:23.778371 env[1212]: time="2025-05-14T00:48:23.778334588Z" level=info msg="Stop container \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\" with signal terminated" May 14 00:48:23.813099 systemd[1]: cri-containerd-c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28.scope: Deactivated successfully. May 14 00:48:23.812000 audit: BPF prog-id=163 op=UNLOAD May 14 00:48:23.813581 systemd[1]: cri-containerd-c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28.scope: Consumed 1.054s CPU time. May 14 00:48:23.815000 audit[4987]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=4987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.815000 audit[4987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc503fb80 a2=0 a3=1 items=0 ppid=2144 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.815000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:23.818000 audit: BPF prog-id=166 op=UNLOAD May 14 00:48:23.822000 audit[4987]: NETFILTER_CFG table=nat:114 family=2 entries=36 op=nft_register_rule pid=4987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.822000 audit[4987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffc503fb80 a2=0 a3=1 items=0 ppid=2144 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:23.835699 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28-rootfs.mount: Deactivated successfully. May 14 00:48:23.836869 env[1212]: time="2025-05-14T00:48:23.836827225Z" level=info msg="shim disconnected" id=c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28 May 14 00:48:23.836958 env[1212]: time="2025-05-14T00:48:23.836870827Z" level=warning msg="cleaning up after shim disconnected" id=c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28 namespace=k8s.io May 14 00:48:23.836958 env[1212]: time="2025-05-14T00:48:23.836880267Z" level=info msg="cleaning up dead shim" May 14 00:48:23.844893 env[1212]: time="2025-05-14T00:48:23.844860029Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5000 runtime=io.containerd.runc.v2\n" May 14 00:48:23.857986 env[1212]: time="2025-05-14T00:48:23.857941556Z" level=info msg="StopContainer for \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\" returns successfully" May 14 00:48:23.858583 env[1212]: time="2025-05-14T00:48:23.858549261Z" level=info msg="StopPodSandbox for \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\"" May 14 00:48:23.858743 env[1212]: time="2025-05-14T00:48:23.858718547Z" level=info msg="Container to stop \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 14 00:48:23.861199 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2-shm.mount: Deactivated successfully. May 14 00:48:23.867902 systemd[1]: cri-containerd-7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2.scope: Deactivated successfully. May 14 00:48:23.866000 audit: BPF prog-id=159 op=UNLOAD May 14 00:48:23.870000 audit: BPF prog-id=162 op=UNLOAD May 14 00:48:23.889672 env[1212]: time="2025-05-14T00:48:23.888058530Z" level=info msg="shim disconnected" id=7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2 May 14 00:48:23.889672 env[1212]: time="2025-05-14T00:48:23.888107812Z" level=warning msg="cleaning up after shim disconnected" id=7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2 namespace=k8s.io May 14 00:48:23.889672 env[1212]: time="2025-05-14T00:48:23.888117692Z" level=info msg="cleaning up dead shim" May 14 00:48:23.889110 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2-rootfs.mount: Deactivated successfully. May 14 00:48:23.898524 env[1212]: time="2025-05-14T00:48:23.898474229Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5031 runtime=io.containerd.runc.v2\n" May 14 00:48:23.955414 systemd-networkd[1050]: cali049ce7497c7: Link DOWN May 14 00:48:23.955422 systemd-networkd[1050]: cali049ce7497c7: Lost carrier May 14 00:48:23.964000 audit[5074]: NETFILTER_CFG table=filter:115 family=2 entries=44 op=nft_register_rule pid=5074 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:23.964000 audit[5074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6552 a0=3 a1=ffffcccc50c0 a2=0 a3=ffff9aa75fa8 items=0 ppid=4733 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.964000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:23.965000 audit[5074]: NETFILTER_CFG table=filter:116 family=2 entries=2 op=nft_unregister_chain pid=5074 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:23.965000 audit[5074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffcccc50c0 a2=0 a3=ffff9aa75fa8 items=0 ppid=4733 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.965000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:23.953 [INFO][5061] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:23.954 [INFO][5061] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" iface="eth0" netns="/var/run/netns/cni-2027c22d-ef39-efa6-1fa1-53ba9ed51da7" May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:23.954 [INFO][5061] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" iface="eth0" netns="/var/run/netns/cni-2027c22d-ef39-efa6-1fa1-53ba9ed51da7" May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:23.969 [INFO][5061] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" after=15.232533ms iface="eth0" netns="/var/run/netns/cni-2027c22d-ef39-efa6-1fa1-53ba9ed51da7" May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:23.969 [INFO][5061] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:23.969 [INFO][5061] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:23.988 [INFO][5076] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:23.988 [INFO][5076] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:23.988 [INFO][5076] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:24.024 [INFO][5076] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:24.024 [INFO][5076] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:24.026 [INFO][5076] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:24.029069 env[1212]: 2025-05-14 00:48:24.027 [INFO][5061] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:24.033040 env[1212]: time="2025-05-14T00:48:24.032741581Z" level=info msg="TearDown network for sandbox \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\" successfully" May 14 00:48:24.033040 env[1212]: time="2025-05-14T00:48:24.032784863Z" level=info msg="StopPodSandbox for \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\" returns successfully" May 14 00:48:24.031463 systemd[1]: run-netns-cni\x2d2027c22d\x2def39\x2defa6\x2d1fa1\x2d53ba9ed51da7.mount: Deactivated successfully. May 14 00:48:24.033223 env[1212]: time="2025-05-14T00:48:24.033194479Z" level=info msg="StopPodSandbox for \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\"" May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.069 [WARNING][5099] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0", GenerateName:"calico-apiserver-645b7c96b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"01c5ffd5-98f0-41f4-ac02-cee91eb6a543", ResourceVersion:"1129", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"645b7c96b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2", Pod:"calico-apiserver-645b7c96b4-9ffhl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali049ce7497c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.069 [INFO][5099] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.069 [INFO][5099] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" iface="eth0" netns="" May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.069 [INFO][5099] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.069 [INFO][5099] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.087 [INFO][5107] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.087 [INFO][5107] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.087 [INFO][5107] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.095 [WARNING][5107] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.095 [INFO][5107] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.097 [INFO][5107] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:24.100370 env[1212]: 2025-05-14 00:48:24.099 [INFO][5099] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:24.100896 env[1212]: time="2025-05-14T00:48:24.100859287Z" level=info msg="TearDown network for sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\" successfully" May 14 00:48:24.100961 env[1212]: time="2025-05-14T00:48:24.100945690Z" level=info msg="StopPodSandbox for \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\" returns successfully" May 14 00:48:24.158840 kubelet[1952]: I0514 00:48:24.158780 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-v8b4d\" (UniqueName: \"kubernetes.io/projected/01c5ffd5-98f0-41f4-ac02-cee91eb6a543-kube-api-access-v8b4d\") pod \"01c5ffd5-98f0-41f4-ac02-cee91eb6a543\" (UID: \"01c5ffd5-98f0-41f4-ac02-cee91eb6a543\") " May 14 00:48:24.159015 kubelet[1952]: I0514 00:48:24.158869 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/01c5ffd5-98f0-41f4-ac02-cee91eb6a543-calico-apiserver-certs\") pod \"01c5ffd5-98f0-41f4-ac02-cee91eb6a543\" (UID: \"01c5ffd5-98f0-41f4-ac02-cee91eb6a543\") " May 14 00:48:24.163675 kubelet[1952]: I0514 00:48:24.163546 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/01c5ffd5-98f0-41f4-ac02-cee91eb6a543-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "01c5ffd5-98f0-41f4-ac02-cee91eb6a543" (UID: "01c5ffd5-98f0-41f4-ac02-cee91eb6a543"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 14 00:48:24.163675 kubelet[1952]: I0514 00:48:24.163546 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/01c5ffd5-98f0-41f4-ac02-cee91eb6a543-kube-api-access-v8b4d" (OuterVolumeSpecName: "kube-api-access-v8b4d") pod "01c5ffd5-98f0-41f4-ac02-cee91eb6a543" (UID: "01c5ffd5-98f0-41f4-ac02-cee91eb6a543"). InnerVolumeSpecName "kube-api-access-v8b4d". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 14 00:48:24.163973 systemd[1]: var-lib-kubelet-pods-01c5ffd5\x2d98f0\x2d41f4\x2dac02\x2dcee91eb6a543-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dv8b4d.mount: Deactivated successfully. May 14 00:48:24.164073 systemd[1]: var-lib-kubelet-pods-01c5ffd5\x2d98f0\x2d41f4\x2dac02\x2dcee91eb6a543-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 14 00:48:24.260030 kubelet[1952]: I0514 00:48:24.259985 1952 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-v8b4d\" (UniqueName: \"kubernetes.io/projected/01c5ffd5-98f0-41f4-ac02-cee91eb6a543-kube-api-access-v8b4d\") on node \"localhost\" DevicePath \"\"" May 14 00:48:24.260286 kubelet[1952]: I0514 00:48:24.260270 1952 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/01c5ffd5-98f0-41f4-ac02-cee91eb6a543-calico-apiserver-certs\") on node \"localhost\" DevicePath \"\"" May 14 00:48:24.838000 audit[5117]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=5117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:24.838000 audit[5117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe5c86470 a2=0 a3=1 items=0 ppid=2144 pid=5117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:24.847675 kubelet[1952]: I0514 00:48:24.847645 1952 scope.go:117] "RemoveContainer" containerID="c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28" May 14 00:48:24.849060 env[1212]: time="2025-05-14T00:48:24.849024361Z" level=info msg="RemoveContainer for \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\"" May 14 00:48:24.846000 audit[5117]: NETFILTER_CFG table=nat:118 family=2 entries=36 op=nft_register_rule pid=5117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:24.846000 audit[5117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffe5c86470 a2=0 a3=1 items=0 ppid=2144 pid=5117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:24.852535 systemd[1]: Removed slice kubepods-besteffort-pod01c5ffd5_98f0_41f4_ac02_cee91eb6a543.slice. May 14 00:48:24.852624 systemd[1]: kubepods-besteffort-pod01c5ffd5_98f0_41f4_ac02_cee91eb6a543.slice: Consumed 1.091s CPU time. May 14 00:48:24.853767 env[1212]: time="2025-05-14T00:48:24.853726308Z" level=info msg="RemoveContainer for \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\" returns successfully" May 14 00:48:24.854715 kubelet[1952]: I0514 00:48:24.854688 1952 scope.go:117] "RemoveContainer" containerID="c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28" May 14 00:48:24.855092 env[1212]: time="2025-05-14T00:48:24.854911875Z" level=error msg="ContainerStatus for \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\": not found" May 14 00:48:24.855201 kubelet[1952]: E0514 00:48:24.855184 1952 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\": not found" containerID="c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28" May 14 00:48:24.855233 kubelet[1952]: I0514 00:48:24.855214 1952 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28"} err="failed to get container status \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\": rpc error: code = NotFound desc = an error occurred when try to find container \"c991626e7b9d4693cdcc97e5cc03c4fb94d064f2237faa64aed257e7adb2dc28\": not found" May 14 00:48:25.678847 kubelet[1952]: I0514 00:48:25.678809 1952 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="01c5ffd5-98f0-41f4-ac02-cee91eb6a543" path="/var/lib/kubelet/pods/01c5ffd5-98f0-41f4-ac02-cee91eb6a543/volumes" May 14 00:48:26.723000 audit[5119]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=5119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:26.725510 kernel: kauditd_printk_skb: 29 callbacks suppressed May 14 00:48:26.725565 kernel: audit: type=1325 audit(1747183706.723:1449): table=filter:119 family=2 entries=8 op=nft_register_rule pid=5119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:26.723000 audit[5119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff6c9ec30 a2=0 a3=1 items=0 ppid=2144 pid=5119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.731125 kernel: audit: type=1300 audit(1747183706.723:1449): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff6c9ec30 a2=0 a3=1 items=0 ppid=2144 pid=5119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.731199 kernel: audit: type=1327 audit(1747183706.723:1449): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:26.723000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:26.737000 audit[5119]: NETFILTER_CFG table=nat:120 family=2 entries=36 op=nft_register_rule pid=5119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:26.737000 audit[5119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff6c9ec30 a2=0 a3=1 items=0 ppid=2144 pid=5119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.747036 kernel: audit: type=1325 audit(1747183706.737:1450): table=nat:120 family=2 entries=36 op=nft_register_rule pid=5119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:26.747098 kernel: audit: type=1300 audit(1747183706.737:1450): arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff6c9ec30 a2=0 a3=1 items=0 ppid=2144 pid=5119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.737000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:26.749726 systemd[1]: Started sshd@14-10.0.0.97:22-10.0.0.1:47840.service. May 14 00:48:26.752720 kernel: audit: type=1327 audit(1747183706.737:1450): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:26.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.97:22-10.0.0.1:47840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:26.755957 kernel: audit: type=1130 audit(1747183706.746:1451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.97:22-10.0.0.1:47840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:26.797707 sshd[5121]: Accepted publickey for core from 10.0.0.1 port 47840 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:26.796000 audit[5121]: USER_ACCT pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:26.801944 sshd[5121]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:26.800000 audit[5121]: CRED_ACQ pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:26.805347 kernel: audit: type=1101 audit(1747183706.796:1452): pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:26.805423 kernel: audit: type=1103 audit(1747183706.800:1453): pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:26.807753 kernel: audit: type=1006 audit(1747183706.800:1454): pid=5121 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 14 00:48:26.800000 audit[5121]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcba2aff0 a2=3 a3=1 items=0 ppid=1 pid=5121 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.800000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:26.810267 systemd-logind[1200]: New session 15 of user core. May 14 00:48:26.811915 systemd[1]: Started session-15.scope. May 14 00:48:26.815000 audit[5121]: USER_START pid=5121 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:26.815000 audit[5123]: CRED_ACQ pid=5123 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:26.939324 sshd[5121]: pam_unix(sshd:session): session closed for user core May 14 00:48:26.939000 audit[5121]: USER_END pid=5121 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:26.939000 audit[5121]: CRED_DISP pid=5121 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:26.942466 systemd[1]: sshd@14-10.0.0.97:22-10.0.0.1:47840.service: Deactivated successfully. May 14 00:48:26.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.97:22-10.0.0.1:47840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:26.943235 systemd[1]: session-15.scope: Deactivated successfully. May 14 00:48:26.944013 systemd-logind[1200]: Session 15 logged out. Waiting for processes to exit. May 14 00:48:26.944702 systemd-logind[1200]: Removed session 15. May 14 00:48:29.155000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:29.155000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=40123a3020 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:48:29.155000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:48:29.162000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:29.162000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=401249a0c0 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:48:29.162000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:48:29.162000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:29.162000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=400f834660 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:48:29.162000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:48:29.170000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:29.170000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=401249a1b0 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:48:29.170000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:48:29.170000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:29.170000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=400fddd440 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:48:29.170000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:48:29.170000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:29.170000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4011ae7110 a2=fc6 a3=0 items=0 ppid=1672 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c861 key=(null) May 14 00:48:29.170000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:48:29.600000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:29.600000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002f1ac20 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:48:29.600000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:48:29.601000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:29.601000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002f92510 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:48:29.601000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:48:30.843928 kubelet[1952]: E0514 00:48:30.843894 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:31.650528 env[1212]: time="2025-05-14T00:48:31.650462388Z" level=info msg="StopPodSandbox for \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\"" May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.688 [WARNING][5178] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0", GenerateName:"calico-apiserver-5c856d6799-", Namespace:"calico-apiserver", SelfLink:"", UID:"f27fc4b7-dd9e-4481-aeb6-12e6130e42ea", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c856d6799", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9", Pod:"calico-apiserver-5c856d6799-4t4bd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliba306bbc65e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.689 [INFO][5178] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.689 [INFO][5178] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" iface="eth0" netns="" May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.689 [INFO][5178] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.689 [INFO][5178] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.711 [INFO][5190] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" HandleID="k8s-pod-network.1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.711 [INFO][5190] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.711 [INFO][5190] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.723 [WARNING][5190] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" HandleID="k8s-pod-network.1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.723 [INFO][5190] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" HandleID="k8s-pod-network.1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.729 [INFO][5190] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:31.733212 env[1212]: 2025-05-14 00:48:31.731 [INFO][5178] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:31.733902 env[1212]: time="2025-05-14T00:48:31.733302217Z" level=info msg="TearDown network for sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\" successfully" May 14 00:48:31.733999 env[1212]: time="2025-05-14T00:48:31.733974361Z" level=info msg="StopPodSandbox for \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\" returns successfully" May 14 00:48:31.736359 env[1212]: time="2025-05-14T00:48:31.736325887Z" level=info msg="RemovePodSandbox for \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\"" May 14 00:48:31.736563 env[1212]: time="2025-05-14T00:48:31.736518814Z" level=info msg="Forcibly stopping sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\"" May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.770 [WARNING][5213] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0", GenerateName:"calico-apiserver-5c856d6799-", Namespace:"calico-apiserver", SelfLink:"", UID:"f27fc4b7-dd9e-4481-aeb6-12e6130e42ea", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c856d6799", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"22d6f95d8c398b3b05c5e4be95becb6ac6ec06d1c8df0398cf48cc3e06256da9", Pod:"calico-apiserver-5c856d6799-4t4bd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliba306bbc65e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.771 [INFO][5213] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.771 [INFO][5213] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" iface="eth0" netns="" May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.771 [INFO][5213] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.771 [INFO][5213] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.789 [INFO][5221] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" HandleID="k8s-pod-network.1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.789 [INFO][5221] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.789 [INFO][5221] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.798 [WARNING][5221] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" HandleID="k8s-pod-network.1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.798 [INFO][5221] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" HandleID="k8s-pod-network.1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" Workload="localhost-k8s-calico--apiserver--5c856d6799--4t4bd-eth0" May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.799 [INFO][5221] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:31.802885 env[1212]: 2025-05-14 00:48:31.801 [INFO][5213] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e" May 14 00:48:31.803307 env[1212]: time="2025-05-14T00:48:31.802907602Z" level=info msg="TearDown network for sandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\" successfully" May 14 00:48:31.805590 env[1212]: time="2025-05-14T00:48:31.805564579Z" level=info msg="RemovePodSandbox \"1737c69972ed87af8978a3ab24ccc59b1918d2f6a4f1ad34d15bc218eeb3c65e\" returns successfully" May 14 00:48:31.806139 env[1212]: time="2025-05-14T00:48:31.806109239Z" level=info msg="StopPodSandbox for \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\"" May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.842 [WARNING][5243] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0", GenerateName:"calico-apiserver-645b7c96b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"07c3c723-015f-4039-b023-092360f2960b", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"645b7c96b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce", Pod:"calico-apiserver-645b7c96b4-7lzps", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali50439b52c1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.843 [INFO][5243] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.843 [INFO][5243] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" iface="eth0" netns="" May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.843 [INFO][5243] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.843 [INFO][5243] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.871 [INFO][5252] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" HandleID="k8s-pod-network.895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.871 [INFO][5252] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.871 [INFO][5252] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.880 [WARNING][5252] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" HandleID="k8s-pod-network.895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.880 [INFO][5252] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" HandleID="k8s-pod-network.895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.881 [INFO][5252] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:31.884642 env[1212]: 2025-05-14 00:48:31.883 [INFO][5243] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:31.885076 env[1212]: time="2025-05-14T00:48:31.884652551Z" level=info msg="TearDown network for sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\" successfully" May 14 00:48:31.885076 env[1212]: time="2025-05-14T00:48:31.884680992Z" level=info msg="StopPodSandbox for \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\" returns successfully" May 14 00:48:31.885497 env[1212]: time="2025-05-14T00:48:31.885461701Z" level=info msg="RemovePodSandbox for \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\"" May 14 00:48:31.885569 env[1212]: time="2025-05-14T00:48:31.885504102Z" level=info msg="Forcibly stopping sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\"" May 14 00:48:31.950561 kernel: kauditd_printk_skb: 31 callbacks suppressed May 14 00:48:31.950661 kernel: audit: type=1130 audit(1747183711.944:1468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.97:22-10.0.0.1:47854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:31.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.97:22-10.0.0.1:47854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:31.945267 systemd[1]: Started sshd@15-10.0.0.97:22-10.0.0.1:47854.service. May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.918 [WARNING][5276] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0", GenerateName:"calico-apiserver-645b7c96b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"07c3c723-015f-4039-b023-092360f2960b", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"645b7c96b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce", Pod:"calico-apiserver-645b7c96b4-7lzps", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali50439b52c1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.918 [INFO][5276] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.918 [INFO][5276] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" iface="eth0" netns="" May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.918 [INFO][5276] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.918 [INFO][5276] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.935 [INFO][5284] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" HandleID="k8s-pod-network.895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.935 [INFO][5284] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.935 [INFO][5284] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.944 [WARNING][5284] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" HandleID="k8s-pod-network.895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.944 [INFO][5284] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" HandleID="k8s-pod-network.895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.946 [INFO][5284] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:31.954401 env[1212]: 2025-05-14 00:48:31.952 [INFO][5276] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7" May 14 00:48:31.954755 env[1212]: time="2025-05-14T00:48:31.954449063Z" level=info msg="TearDown network for sandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\" successfully" May 14 00:48:31.957369 env[1212]: time="2025-05-14T00:48:31.957327489Z" level=info msg="RemovePodSandbox \"895f515cab4385e1170c55733404bc35e6cc5f39fbd90c5ade81b8cf98cb45b7\" returns successfully" May 14 00:48:31.960587 env[1212]: time="2025-05-14T00:48:31.960555767Z" level=info msg="StopPodSandbox for \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\"" May 14 00:48:31.983000 audit[5293]: USER_ACCT pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:31.986655 sshd[5293]: Accepted publickey for core from 10.0.0.1 port 47854 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:31.986829 sshd[5293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:31.984000 audit[5293]: CRED_ACQ pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:31.991688 kernel: audit: type=1101 audit(1747183711.983:1469): pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:31.991794 kernel: audit: type=1103 audit(1747183711.984:1470): pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:31.991874 kernel: audit: type=1006 audit(1747183711.985:1471): pid=5293 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 14 00:48:31.985000 audit[5293]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0794f20 a2=3 a3=1 items=0 ppid=1 pid=5293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:31.994901 systemd-logind[1200]: New session 16 of user core. May 14 00:48:31.995755 systemd[1]: Started session-16.scope. May 14 00:48:31.997528 kernel: audit: type=1300 audit(1747183711.985:1471): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0794f20 a2=3 a3=1 items=0 ppid=1 pid=5293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:31.997591 kernel: audit: type=1327 audit(1747183711.985:1471): proctitle=737368643A20636F7265205B707269765D May 14 00:48:31.985000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:31.999000 audit[5293]: USER_START pid=5293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.000000 audit[5317]: CRED_ACQ pid=5317 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.007507 kernel: audit: type=1105 audit(1747183711.999:1472): pid=5293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.007564 kernel: audit: type=1103 audit(1747183712.000:1473): pid=5317 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.004 [WARNING][5310] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--9mq7g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c9b4d85b-ed70-4abb-84fe-dbae253e2eb2", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42", Pod:"csi-node-driver-9mq7g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3fbcb64e7d2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.004 [INFO][5310] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.004 [INFO][5310] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" iface="eth0" netns="" May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.004 [INFO][5310] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.004 [INFO][5310] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.022 [INFO][5319] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" HandleID="k8s-pod-network.f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.022 [INFO][5319] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.022 [INFO][5319] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.030 [WARNING][5319] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" HandleID="k8s-pod-network.f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.030 [INFO][5319] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" HandleID="k8s-pod-network.f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.032 [INFO][5319] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.034717 env[1212]: 2025-05-14 00:48:32.033 [INFO][5310] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:32.035317 env[1212]: time="2025-05-14T00:48:32.034745188Z" level=info msg="TearDown network for sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\" successfully" May 14 00:48:32.035317 env[1212]: time="2025-05-14T00:48:32.035308209Z" level=info msg="StopPodSandbox for \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\" returns successfully" May 14 00:48:32.035866 env[1212]: time="2025-05-14T00:48:32.035839148Z" level=info msg="RemovePodSandbox for \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\"" May 14 00:48:32.036017 env[1212]: time="2025-05-14T00:48:32.035975033Z" level=info msg="Forcibly stopping sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\"" May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.079 [WARNING][5342] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--9mq7g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c9b4d85b-ed70-4abb-84fe-dbae253e2eb2", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c4b33f79b02a1a66d1b82de464584bdb880873758532a44a4ff06d7561f87b42", Pod:"csi-node-driver-9mq7g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3fbcb64e7d2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.079 [INFO][5342] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.079 [INFO][5342] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" iface="eth0" netns="" May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.079 [INFO][5342] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.079 [INFO][5342] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.101 [INFO][5358] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" HandleID="k8s-pod-network.f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.101 [INFO][5358] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.101 [INFO][5358] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.110 [WARNING][5358] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" HandleID="k8s-pod-network.f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.110 [INFO][5358] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" HandleID="k8s-pod-network.f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" Workload="localhost-k8s-csi--node--driver--9mq7g-eth0" May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.112 [INFO][5358] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.118138 env[1212]: 2025-05-14 00:48:32.116 [INFO][5342] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c" May 14 00:48:32.118767 env[1212]: time="2025-05-14T00:48:32.118731470Z" level=info msg="TearDown network for sandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\" successfully" May 14 00:48:32.127109 env[1212]: time="2025-05-14T00:48:32.127066932Z" level=info msg="RemovePodSandbox \"f274145d7a81e567a6dad0fc4219ea452768bd099579b671827ba222254e1e0c\" returns successfully" May 14 00:48:32.127794 env[1212]: time="2025-05-14T00:48:32.127769438Z" level=info msg="StopPodSandbox for \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\"" May 14 00:48:32.130696 sshd[5293]: pam_unix(sshd:session): session closed for user core May 14 00:48:32.131000 audit[5293]: USER_END pid=5293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.131000 audit[5293]: CRED_DISP pid=5293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.135195 systemd[1]: Started sshd@16-10.0.0.97:22-10.0.0.1:47866.service. May 14 00:48:32.135734 systemd[1]: sshd@15-10.0.0.97:22-10.0.0.1:47854.service: Deactivated successfully. May 14 00:48:32.136725 systemd[1]: session-16.scope: Deactivated successfully. May 14 00:48:32.137301 systemd-logind[1200]: Session 16 logged out. Waiting for processes to exit. May 14 00:48:32.138693 systemd-logind[1200]: Removed session 16. May 14 00:48:32.139999 kernel: audit: type=1106 audit(1747183712.131:1474): pid=5293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.140070 kernel: audit: type=1104 audit(1747183712.131:1475): pid=5293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.97:22-10.0.0.1:47866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:32.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.97:22-10.0.0.1:47854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:32.182000 audit[5378]: USER_ACCT pid=5378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.183631 sshd[5378]: Accepted publickey for core from 10.0.0.1 port 47866 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:32.183000 audit[5378]: CRED_ACQ pid=5378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.183000 audit[5378]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefd73740 a2=3 a3=1 items=0 ppid=1 pid=5378 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:32.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:32.184964 sshd[5378]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:32.188332 systemd-logind[1200]: New session 17 of user core. May 14 00:48:32.189179 systemd[1]: Started session-17.scope. May 14 00:48:32.192000 audit[5378]: USER_START pid=5378 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.193000 audit[5402]: CRED_ACQ pid=5402 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.179 [WARNING][5385] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--k84nz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"427b275f-8795-4674-81ba-05adaf2dfdcc", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59", Pod:"coredns-668d6bf9bc-k84nz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5ee21d42c09", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.180 [INFO][5385] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.180 [INFO][5385] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" iface="eth0" netns="" May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.180 [INFO][5385] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.180 [INFO][5385] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.204 [INFO][5395] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" HandleID="k8s-pod-network.b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.204 [INFO][5395] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.204 [INFO][5395] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.212 [WARNING][5395] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" HandleID="k8s-pod-network.b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.213 [INFO][5395] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" HandleID="k8s-pod-network.b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.214 [INFO][5395] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.217077 env[1212]: 2025-05-14 00:48:32.215 [INFO][5385] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:32.218871 env[1212]: time="2025-05-14T00:48:32.217043032Z" level=info msg="TearDown network for sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\" successfully" May 14 00:48:32.218914 env[1212]: time="2025-05-14T00:48:32.218866818Z" level=info msg="StopPodSandbox for \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\" returns successfully" May 14 00:48:32.219381 env[1212]: time="2025-05-14T00:48:32.219352635Z" level=info msg="RemovePodSandbox for \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\"" May 14 00:48:32.219510 env[1212]: time="2025-05-14T00:48:32.219472480Z" level=info msg="Forcibly stopping sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\"" May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.257 [WARNING][5419] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--k84nz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"427b275f-8795-4674-81ba-05adaf2dfdcc", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d5f2fd557f2e4fd4a9fb4b2d887479a9bf9e14dae4081295d5d1073ad72b9d59", Pod:"coredns-668d6bf9bc-k84nz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5ee21d42c09", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.257 [INFO][5419] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.257 [INFO][5419] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" iface="eth0" netns="" May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.257 [INFO][5419] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.257 [INFO][5419] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.275 [INFO][5432] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" HandleID="k8s-pod-network.b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.275 [INFO][5432] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.275 [INFO][5432] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.285 [WARNING][5432] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" HandleID="k8s-pod-network.b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.285 [INFO][5432] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" HandleID="k8s-pod-network.b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" Workload="localhost-k8s-coredns--668d6bf9bc--k84nz-eth0" May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.286 [INFO][5432] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.289748 env[1212]: 2025-05-14 00:48:32.288 [INFO][5419] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479" May 14 00:48:32.290322 env[1212]: time="2025-05-14T00:48:32.289775466Z" level=info msg="TearDown network for sandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\" successfully" May 14 00:48:32.295901 env[1212]: time="2025-05-14T00:48:32.295863807Z" level=info msg="RemovePodSandbox \"b4a7b981b078892891ffbc901eff84e8910dfd796443bab4ad81cd8278ff6479\" returns successfully" May 14 00:48:32.296540 env[1212]: time="2025-05-14T00:48:32.296515630Z" level=info msg="StopPodSandbox for \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\"" May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.340 [WARNING][5454] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.344 [INFO][5454] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.344 [INFO][5454] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" iface="eth0" netns="" May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.344 [INFO][5454] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.344 [INFO][5454] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.366 [INFO][5463] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.366 [INFO][5463] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.366 [INFO][5463] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.377 [WARNING][5463] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.377 [INFO][5463] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.378 [INFO][5463] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.381289 env[1212]: 2025-05-14 00:48:32.380 [INFO][5454] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:32.381943 env[1212]: time="2025-05-14T00:48:32.381902523Z" level=info msg="TearDown network for sandbox \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\" successfully" May 14 00:48:32.382031 env[1212]: time="2025-05-14T00:48:32.382014007Z" level=info msg="StopPodSandbox for \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\" returns successfully" May 14 00:48:32.382690 env[1212]: time="2025-05-14T00:48:32.382666031Z" level=info msg="RemovePodSandbox for \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\"" May 14 00:48:32.382831 env[1212]: time="2025-05-14T00:48:32.382794075Z" level=info msg="Forcibly stopping sandbox \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\"" May 14 00:48:32.438543 sshd[5378]: pam_unix(sshd:session): session closed for user core May 14 00:48:32.438000 audit[5378]: USER_END pid=5378 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.438000 audit[5378]: CRED_DISP pid=5378 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.443077 systemd[1]: sshd@16-10.0.0.97:22-10.0.0.1:47866.service: Deactivated successfully. May 14 00:48:32.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.97:22-10.0.0.1:47866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:32.443815 systemd[1]: session-17.scope: Deactivated successfully. May 14 00:48:32.444446 systemd-logind[1200]: Session 17 logged out. Waiting for processes to exit. May 14 00:48:32.445560 systemd[1]: Started sshd@17-10.0.0.97:22-10.0.0.1:47870.service. May 14 00:48:32.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.97:22-10.0.0.1:47870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:32.447049 systemd-logind[1200]: Removed session 17. May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.421 [WARNING][5487] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.421 [INFO][5487] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.421 [INFO][5487] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" iface="eth0" netns="" May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.421 [INFO][5487] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.421 [INFO][5487] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.446 [INFO][5497] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.446 [INFO][5497] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.446 [INFO][5497] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.456 [WARNING][5497] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.456 [INFO][5497] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" HandleID="k8s-pod-network.7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.457 [INFO][5497] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.463116 env[1212]: 2025-05-14 00:48:32.461 [INFO][5487] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2" May 14 00:48:32.463579 env[1212]: time="2025-05-14T00:48:32.463544320Z" level=info msg="TearDown network for sandbox \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\" successfully" May 14 00:48:32.466353 env[1212]: time="2025-05-14T00:48:32.466319781Z" level=info msg="RemovePodSandbox \"7e85a065711b74f97052607cb9b4cdb170409d7cd329158a47b87d0f55506ef2\" returns successfully" May 14 00:48:32.466928 env[1212]: time="2025-05-14T00:48:32.466897482Z" level=info msg="StopPodSandbox for \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\"" May 14 00:48:32.486000 audit[5507]: USER_ACCT pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.487748 sshd[5507]: Accepted publickey for core from 10.0.0.1 port 47870 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:32.488000 audit[5507]: CRED_ACQ pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.488000 audit[5507]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4191bc0 a2=3 a3=1 items=0 ppid=1 pid=5507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:32.488000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:32.490245 sshd[5507]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:32.497144 systemd-logind[1200]: New session 18 of user core. May 14 00:48:32.497871 systemd[1]: Started session-18.scope. May 14 00:48:32.501000 audit[5507]: USER_START pid=5507 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.502000 audit[5539]: CRED_ACQ pid=5539 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.499 [WARNING][5525] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.499 [INFO][5525] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.499 [INFO][5525] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" iface="eth0" netns="" May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.499 [INFO][5525] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.499 [INFO][5525] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.517 [INFO][5534] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.517 [INFO][5534] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.518 [INFO][5534] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.526 [WARNING][5534] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.526 [INFO][5534] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.527 [INFO][5534] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.530387 env[1212]: 2025-05-14 00:48:32.529 [INFO][5525] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:32.530735 env[1212]: time="2025-05-14T00:48:32.530450904Z" level=info msg="TearDown network for sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\" successfully" May 14 00:48:32.530735 env[1212]: time="2025-05-14T00:48:32.530487385Z" level=info msg="StopPodSandbox for \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\" returns successfully" May 14 00:48:32.531021 env[1212]: time="2025-05-14T00:48:32.530981683Z" level=info msg="RemovePodSandbox for \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\"" May 14 00:48:32.531154 env[1212]: time="2025-05-14T00:48:32.531113008Z" level=info msg="Forcibly stopping sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\"" May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.564 [WARNING][5559] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" WorkloadEndpoint="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.564 [INFO][5559] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.565 [INFO][5559] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" iface="eth0" netns="" May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.565 [INFO][5559] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.565 [INFO][5559] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.581 [INFO][5574] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.582 [INFO][5574] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.582 [INFO][5574] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.591 [WARNING][5574] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.591 [INFO][5574] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" HandleID="k8s-pod-network.43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" Workload="localhost-k8s-calico--apiserver--645b7c96b4--9ffhl-eth0" May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.593 [INFO][5574] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.596925 env[1212]: 2025-05-14 00:48:32.594 [INFO][5559] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5" May 14 00:48:32.597403 env[1212]: time="2025-05-14T00:48:32.596945193Z" level=info msg="TearDown network for sandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\" successfully" May 14 00:48:32.599559 env[1212]: time="2025-05-14T00:48:32.599521526Z" level=info msg="RemovePodSandbox \"43ee61120ad093dc4febc45074a37df5464cd7bce8ee408a3d90c32c26108db5\" returns successfully" May 14 00:48:32.600451 env[1212]: time="2025-05-14T00:48:32.600419798Z" level=info msg="StopPodSandbox for \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\"" May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.635 [WARNING][5597] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0", GenerateName:"calico-kube-controllers-8656ccb584-", Namespace:"calico-system", SelfLink:"", UID:"c82c1ca9-af53-4961-9e06-6c41aa4edf49", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8656ccb584", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8", Pod:"calico-kube-controllers-8656ccb584-l42f8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali957d40a9165", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.635 [INFO][5597] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.635 [INFO][5597] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" iface="eth0" netns="" May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.635 [INFO][5597] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.635 [INFO][5597] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.654 [INFO][5606] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" HandleID="k8s-pod-network.89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.654 [INFO][5606] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.654 [INFO][5606] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.663 [WARNING][5606] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" HandleID="k8s-pod-network.89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.663 [INFO][5606] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" HandleID="k8s-pod-network.89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.664 [INFO][5606] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.669048 env[1212]: 2025-05-14 00:48:32.667 [INFO][5597] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:32.669818 env[1212]: time="2025-05-14T00:48:32.669081526Z" level=info msg="TearDown network for sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\" successfully" May 14 00:48:32.669818 env[1212]: time="2025-05-14T00:48:32.669112527Z" level=info msg="StopPodSandbox for \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\" returns successfully" May 14 00:48:32.670079 env[1212]: time="2025-05-14T00:48:32.670041280Z" level=info msg="RemovePodSandbox for \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\"" May 14 00:48:32.670227 env[1212]: time="2025-05-14T00:48:32.670165445Z" level=info msg="Forcibly stopping sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\"" May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.712 [WARNING][5629] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0", GenerateName:"calico-kube-controllers-8656ccb584-", Namespace:"calico-system", SelfLink:"", UID:"c82c1ca9-af53-4961-9e06-6c41aa4edf49", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8656ccb584", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8", Pod:"calico-kube-controllers-8656ccb584-l42f8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali957d40a9165", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.712 [INFO][5629] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.712 [INFO][5629] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" iface="eth0" netns="" May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.712 [INFO][5629] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.712 [INFO][5629] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.732 [INFO][5638] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" HandleID="k8s-pod-network.89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.732 [INFO][5638] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.732 [INFO][5638] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.740 [WARNING][5638] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" HandleID="k8s-pod-network.89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.740 [INFO][5638] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" HandleID="k8s-pod-network.89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.742 [INFO][5638] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.745115 env[1212]: 2025-05-14 00:48:32.743 [INFO][5629] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50" May 14 00:48:32.745115 env[1212]: time="2025-05-14T00:48:32.745088959Z" level=info msg="TearDown network for sandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\" successfully" May 14 00:48:32.749152 env[1212]: time="2025-05-14T00:48:32.749119545Z" level=info msg="RemovePodSandbox \"89e638307ca690b23b1dfcf7efba0db630f32cb27bf12a1ae7e995f047a20b50\" returns successfully" May 14 00:48:32.749657 env[1212]: time="2025-05-14T00:48:32.749619803Z" level=info msg="StopPodSandbox for \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\"" May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.782 [WARNING][5662] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"62cca936-2867-4a1c-90ed-75f701fd8645", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac", Pod:"coredns-668d6bf9bc-7fmr6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali984b86d297c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.783 [INFO][5662] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.783 [INFO][5662] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" iface="eth0" netns="" May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.783 [INFO][5662] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.783 [INFO][5662] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.805 [INFO][5671] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" HandleID="k8s-pod-network.c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.805 [INFO][5671] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.805 [INFO][5671] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.813 [WARNING][5671] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" HandleID="k8s-pod-network.c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.813 [INFO][5671] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" HandleID="k8s-pod-network.c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.814 [INFO][5671] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.817657 env[1212]: 2025-05-14 00:48:32.816 [INFO][5662] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:32.818087 env[1212]: time="2025-05-14T00:48:32.817669508Z" level=info msg="TearDown network for sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\" successfully" May 14 00:48:32.818087 env[1212]: time="2025-05-14T00:48:32.817700349Z" level=info msg="StopPodSandbox for \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\" returns successfully" May 14 00:48:32.818500 env[1212]: time="2025-05-14T00:48:32.818475417Z" level=info msg="RemovePodSandbox for \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\"" May 14 00:48:32.818565 env[1212]: time="2025-05-14T00:48:32.818506778Z" level=info msg="Forcibly stopping sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\"" May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.853 [WARNING][5693] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"62cca936-2867-4a1c-90ed-75f701fd8645", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"15dfc84d2322ef85305e9376f4cb94a0e30e41c036ce1c5d3b8fd046e8aa17ac", Pod:"coredns-668d6bf9bc-7fmr6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali984b86d297c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.853 [INFO][5693] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.853 [INFO][5693] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" iface="eth0" netns="" May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.853 [INFO][5693] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.853 [INFO][5693] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.880 [INFO][5701] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" HandleID="k8s-pod-network.c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.880 [INFO][5701] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.880 [INFO][5701] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.888 [WARNING][5701] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" HandleID="k8s-pod-network.c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.888 [INFO][5701] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" HandleID="k8s-pod-network.c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" Workload="localhost-k8s-coredns--668d6bf9bc--7fmr6-eth0" May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.890 [INFO][5701] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:32.895775 env[1212]: 2025-05-14 00:48:32.891 [INFO][5693] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4" May 14 00:48:32.896207 env[1212]: time="2025-05-14T00:48:32.895805258Z" level=info msg="TearDown network for sandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\" successfully" May 14 00:48:32.898595 env[1212]: time="2025-05-14T00:48:32.898559558Z" level=info msg="RemovePodSandbox \"c26890fac9e31c8fdd89ad1ec44aeeeb4b90fd70c3e6d728cc621ab2cb9067a4\" returns successfully" May 14 00:48:33.227000 audit[5714]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:33.227000 audit[5714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffebcfc8f0 a2=0 a3=1 items=0 ppid=2144 pid=5714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.227000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:33.233000 audit[5714]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:33.233000 audit[5714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffebcfc8f0 a2=0 a3=1 items=0 ppid=2144 pid=5714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:33.242786 sshd[5507]: pam_unix(sshd:session): session closed for user core May 14 00:48:33.242000 audit[5507]: USER_END pid=5507 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.242000 audit[5507]: CRED_DISP pid=5507 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.245849 systemd[1]: sshd@17-10.0.0.97:22-10.0.0.1:47870.service: Deactivated successfully. May 14 00:48:33.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.97:22-10.0.0.1:47870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:33.250064 systemd[1]: session-18.scope: Deactivated successfully. May 14 00:48:33.251386 systemd-logind[1200]: Session 18 logged out. Waiting for processes to exit. May 14 00:48:33.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.97:22-10.0.0.1:60270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:33.252560 systemd[1]: Started sshd@18-10.0.0.97:22-10.0.0.1:60270.service. May 14 00:48:33.252000 audit[5718]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:33.252000 audit[5718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffe2b865b0 a2=0 a3=1 items=0 ppid=2144 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:33.254155 systemd-logind[1200]: Removed session 18. May 14 00:48:33.256000 audit[5718]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:33.256000 audit[5718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe2b865b0 a2=0 a3=1 items=0 ppid=2144 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:33.306000 audit[5719]: USER_ACCT pid=5719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.308044 sshd[5719]: Accepted publickey for core from 10.0.0.1 port 60270 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:33.307000 audit[5719]: CRED_ACQ pid=5719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.307000 audit[5719]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc346730 a2=3 a3=1 items=0 ppid=1 pid=5719 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.307000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:33.309419 sshd[5719]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:33.313232 systemd-logind[1200]: New session 19 of user core. May 14 00:48:33.313675 systemd[1]: Started session-19.scope. May 14 00:48:33.316000 audit[5719]: USER_START pid=5719 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.317000 audit[5721]: CRED_ACQ pid=5721 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.576712 sshd[5719]: pam_unix(sshd:session): session closed for user core May 14 00:48:33.576000 audit[5719]: USER_END pid=5719 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.576000 audit[5719]: CRED_DISP pid=5719 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.97:22-10.0.0.1:60278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:33.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.97:22-10.0.0.1:60270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:33.580412 systemd[1]: Started sshd@19-10.0.0.97:22-10.0.0.1:60278.service. May 14 00:48:33.580930 systemd[1]: sshd@18-10.0.0.97:22-10.0.0.1:60270.service: Deactivated successfully. May 14 00:48:33.582495 systemd[1]: session-19.scope: Deactivated successfully. May 14 00:48:33.587529 systemd-logind[1200]: Session 19 logged out. Waiting for processes to exit. May 14 00:48:33.590095 systemd-logind[1200]: Removed session 19. May 14 00:48:33.621000 audit[5730]: USER_ACCT pid=5730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.623639 sshd[5730]: Accepted publickey for core from 10.0.0.1 port 60278 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:33.622000 audit[5730]: CRED_ACQ pid=5730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.622000 audit[5730]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb3a2db0 a2=3 a3=1 items=0 ppid=1 pid=5730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.622000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:33.624126 sshd[5730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:33.631060 systemd[1]: Started session-20.scope. May 14 00:48:33.631067 systemd-logind[1200]: New session 20 of user core. May 14 00:48:33.634000 audit[5730]: USER_START pid=5730 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.635000 audit[5733]: CRED_ACQ pid=5733 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.773800 sshd[5730]: pam_unix(sshd:session): session closed for user core May 14 00:48:33.773000 audit[5730]: USER_END pid=5730 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.773000 audit[5730]: CRED_DISP pid=5730 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:33.776579 systemd[1]: sshd@19-10.0.0.97:22-10.0.0.1:60278.service: Deactivated successfully. May 14 00:48:33.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.97:22-10.0.0.1:60278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:33.777301 systemd[1]: session-20.scope: Deactivated successfully. May 14 00:48:33.778154 systemd-logind[1200]: Session 20 logged out. Waiting for processes to exit. May 14 00:48:33.778829 systemd-logind[1200]: Removed session 20. May 14 00:48:35.081060 env[1212]: time="2025-05-14T00:48:35.081010350Z" level=info msg="StopContainer for \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\" with timeout 300 (s)" May 14 00:48:35.081439 env[1212]: time="2025-05-14T00:48:35.081350002Z" level=info msg="Stop container \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\" with signal terminated" May 14 00:48:35.107000 audit[5752]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=5752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:35.107000 audit[5752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff69da470 a2=0 a3=1 items=0 ppid=2144 pid=5752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:35.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:35.114000 audit[5752]: NETFILTER_CFG table=nat:126 family=2 entries=30 op=nft_register_rule pid=5752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:35.114000 audit[5752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffff69da470 a2=0 a3=1 items=0 ppid=2144 pid=5752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:35.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:35.167579 env[1212]: time="2025-05-14T00:48:35.167523445Z" level=info msg="StopContainer for \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\" with timeout 30 (s)" May 14 00:48:35.168217 env[1212]: time="2025-05-14T00:48:35.168183628Z" level=info msg="Stop container \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\" with signal terminated" May 14 00:48:35.181102 systemd[1]: cri-containerd-3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051.scope: Deactivated successfully. May 14 00:48:35.181000 audit: BPF prog-id=183 op=UNLOAD May 14 00:48:35.185000 audit: BPF prog-id=186 op=UNLOAD May 14 00:48:35.203818 env[1212]: time="2025-05-14T00:48:35.203775245Z" level=info msg="shim disconnected" id=3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051 May 14 00:48:35.204056 env[1212]: time="2025-05-14T00:48:35.204027574Z" level=warning msg="cleaning up after shim disconnected" id=3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051 namespace=k8s.io May 14 00:48:35.204145 env[1212]: time="2025-05-14T00:48:35.204130538Z" level=info msg="cleaning up dead shim" May 14 00:48:35.204733 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051-rootfs.mount: Deactivated successfully. May 14 00:48:35.217515 env[1212]: time="2025-05-14T00:48:35.217479809Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5771 runtime=io.containerd.runc.v2\n" May 14 00:48:35.234909 env[1212]: time="2025-05-14T00:48:35.234864223Z" level=info msg="StopContainer for \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\" returns successfully" May 14 00:48:35.235745 env[1212]: time="2025-05-14T00:48:35.235710133Z" level=info msg="StopPodSandbox for \"33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8\"" May 14 00:48:35.235829 env[1212]: time="2025-05-14T00:48:35.235779815Z" level=info msg="Container to stop \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 14 00:48:35.238207 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8-shm.mount: Deactivated successfully. May 14 00:48:35.247008 systemd[1]: cri-containerd-33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8.scope: Deactivated successfully. May 14 00:48:35.246000 audit: BPF prog-id=143 op=UNLOAD May 14 00:48:35.252000 audit: BPF prog-id=146 op=UNLOAD May 14 00:48:35.268821 env[1212]: time="2025-05-14T00:48:35.268773541Z" level=info msg="shim disconnected" id=33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8 May 14 00:48:35.269018 env[1212]: time="2025-05-14T00:48:35.268998228Z" level=warning msg="cleaning up after shim disconnected" id=33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8 namespace=k8s.io May 14 00:48:35.269114 env[1212]: time="2025-05-14T00:48:35.269099472Z" level=info msg="cleaning up dead shim" May 14 00:48:35.270616 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8-rootfs.mount: Deactivated successfully. May 14 00:48:35.279034 env[1212]: time="2025-05-14T00:48:35.278989381Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5802 runtime=io.containerd.runc.v2\n" May 14 00:48:35.361221 systemd-networkd[1050]: cali957d40a9165: Link DOWN May 14 00:48:35.361228 systemd-networkd[1050]: cali957d40a9165: Lost carrier May 14 00:48:35.378000 audit[5850]: NETFILTER_CFG table=filter:127 family=2 entries=46 op=nft_register_rule pid=5850 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:35.378000 audit[5850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6824 a0=3 a1=fffff684d350 a2=0 a3=ffffae16efa8 items=0 ppid=4733 pid=5850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:35.378000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:35.379000 audit[5850]: NETFILTER_CFG table=filter:128 family=2 entries=6 op=nft_unregister_chain pid=5850 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:35.379000 audit[5850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=848 a0=3 a1=fffff684d350 a2=0 a3=ffffae16efa8 items=0 ppid=4733 pid=5850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:35.379000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.359 [INFO][5831] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.359 [INFO][5831] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" iface="eth0" netns="/var/run/netns/cni-8facb2e4-ecde-178b-0088-ba7993f602f9" May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.360 [INFO][5831] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" iface="eth0" netns="/var/run/netns/cni-8facb2e4-ecde-178b-0088-ba7993f602f9" May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.371 [INFO][5831] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" after=11.882259ms iface="eth0" netns="/var/run/netns/cni-8facb2e4-ecde-178b-0088-ba7993f602f9" May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.371 [INFO][5831] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.371 [INFO][5831] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.408 [INFO][5846] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" HandleID="k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.408 [INFO][5846] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.408 [INFO][5846] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.451 [INFO][5846] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" HandleID="k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.451 [INFO][5846] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" HandleID="k8s-pod-network.33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" Workload="localhost-k8s-calico--kube--controllers--8656ccb584--l42f8-eth0" May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.452 [INFO][5846] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:35.455853 env[1212]: 2025-05-14 00:48:35.454 [INFO][5831] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8" May 14 00:48:35.456349 env[1212]: time="2025-05-14T00:48:35.456311163Z" level=info msg="TearDown network for sandbox \"33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8\" successfully" May 14 00:48:35.456386 env[1212]: time="2025-05-14T00:48:35.456349244Z" level=info msg="StopPodSandbox for \"33b9673a2270a7cb0cfbd028f6aec12859192a64805398bc5014e44863974be8\" returns successfully" May 14 00:48:35.458384 systemd[1]: run-netns-cni\x2d8facb2e4\x2decde\x2d178b\x2d0088\x2dba7993f602f9.mount: Deactivated successfully. May 14 00:48:35.538037 kubelet[1952]: I0514 00:48:35.537347 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-wkvlc\" (UniqueName: \"kubernetes.io/projected/c82c1ca9-af53-4961-9e06-6c41aa4edf49-kube-api-access-wkvlc\") pod \"c82c1ca9-af53-4961-9e06-6c41aa4edf49\" (UID: \"c82c1ca9-af53-4961-9e06-6c41aa4edf49\") " May 14 00:48:35.538037 kubelet[1952]: I0514 00:48:35.537409 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c82c1ca9-af53-4961-9e06-6c41aa4edf49-tigera-ca-bundle\") pod \"c82c1ca9-af53-4961-9e06-6c41aa4edf49\" (UID: \"c82c1ca9-af53-4961-9e06-6c41aa4edf49\") " May 14 00:48:35.543445 kubelet[1952]: I0514 00:48:35.543370 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/c82c1ca9-af53-4961-9e06-6c41aa4edf49-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "c82c1ca9-af53-4961-9e06-6c41aa4edf49" (UID: "c82c1ca9-af53-4961-9e06-6c41aa4edf49"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 14 00:48:35.544214 systemd[1]: var-lib-kubelet-pods-c82c1ca9\x2daf53\x2d4961\x2d9e06\x2d6c41aa4edf49-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. May 14 00:48:35.546037 kubelet[1952]: I0514 00:48:35.545553 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/c82c1ca9-af53-4961-9e06-6c41aa4edf49-kube-api-access-wkvlc" (OuterVolumeSpecName: "kube-api-access-wkvlc") pod "c82c1ca9-af53-4961-9e06-6c41aa4edf49" (UID: "c82c1ca9-af53-4961-9e06-6c41aa4edf49"). InnerVolumeSpecName "kube-api-access-wkvlc". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 14 00:48:35.638198 kubelet[1952]: I0514 00:48:35.638087 1952 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-wkvlc\" (UniqueName: \"kubernetes.io/projected/c82c1ca9-af53-4961-9e06-6c41aa4edf49-kube-api-access-wkvlc\") on node \"localhost\" DevicePath \"\"" May 14 00:48:35.638358 kubelet[1952]: I0514 00:48:35.638344 1952 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c82c1ca9-af53-4961-9e06-6c41aa4edf49-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 14 00:48:35.655000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:35.655000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002865e40 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:48:35.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:48:35.655000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:35.655000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002865e60 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:48:35.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:48:35.656000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:35.656000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400070e460 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:48:35.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:48:35.657000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:48:35.657000 audit[1829]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021ab160 a2=fc6 a3=0 items=0 ppid=1669 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c981 key=(null) May 14 00:48:35.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:48:35.684513 systemd[1]: Removed slice kubepods-besteffort-podc82c1ca9_af53_4961_9e06_6c41aa4edf49.slice. May 14 00:48:35.881626 kubelet[1952]: I0514 00:48:35.881593 1952 scope.go:117] "RemoveContainer" containerID="3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051" May 14 00:48:35.882716 env[1212]: time="2025-05-14T00:48:35.882676157Z" level=info msg="RemoveContainer for \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\"" May 14 00:48:35.886410 env[1212]: time="2025-05-14T00:48:35.886354449Z" level=info msg="RemoveContainer for \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\" returns successfully" May 14 00:48:35.886579 kubelet[1952]: I0514 00:48:35.886553 1952 scope.go:117] "RemoveContainer" containerID="3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051" May 14 00:48:35.886833 env[1212]: time="2025-05-14T00:48:35.886756299Z" level=error msg="ContainerStatus for \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\": not found" May 14 00:48:35.887012 kubelet[1952]: E0514 00:48:35.886981 1952 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\": not found" containerID="3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051" May 14 00:48:35.887100 kubelet[1952]: I0514 00:48:35.887079 1952 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051"} err="failed to get container status \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\": rpc error: code = NotFound desc = an error occurred when try to find container \"3d20e793f9f5333a0544594620656f591a59e092c48ba18615d1107e8f3d0051\": not found" May 14 00:48:35.914348 kubelet[1952]: I0514 00:48:35.914249 1952 memory_manager.go:355] "RemoveStaleState removing state" podUID="c82c1ca9-af53-4961-9e06-6c41aa4edf49" containerName="calico-kube-controllers" May 14 00:48:35.914520 kubelet[1952]: I0514 00:48:35.914506 1952 memory_manager.go:355] "RemoveStaleState removing state" podUID="01c5ffd5-98f0-41f4-ac02-cee91eb6a543" containerName="calico-apiserver" May 14 00:48:35.919610 systemd[1]: Created slice kubepods-besteffort-podcd72b43f_66c5_4044_adfb_186bc2da636a.slice. May 14 00:48:36.040794 kubelet[1952]: I0514 00:48:36.040739 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cd72b43f-66c5-4044-adfb-186bc2da636a-tigera-ca-bundle\") pod \"calico-kube-controllers-66fd78b6ff-9fx6f\" (UID: \"cd72b43f-66c5-4044-adfb-186bc2da636a\") " pod="calico-system/calico-kube-controllers-66fd78b6ff-9fx6f" May 14 00:48:36.040794 kubelet[1952]: I0514 00:48:36.040797 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tflfn\" (UniqueName: \"kubernetes.io/projected/cd72b43f-66c5-4044-adfb-186bc2da636a-kube-api-access-tflfn\") pod \"calico-kube-controllers-66fd78b6ff-9fx6f\" (UID: \"cd72b43f-66c5-4044-adfb-186bc2da636a\") " pod="calico-system/calico-kube-controllers-66fd78b6ff-9fx6f" May 14 00:48:36.144000 audit[5865]: NETFILTER_CFG table=filter:129 family=2 entries=32 op=nft_register_rule pid=5865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:36.144000 audit[5865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffffddcc450 a2=0 a3=1 items=0 ppid=2144 pid=5865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:36.154000 audit[5865]: NETFILTER_CFG table=nat:130 family=2 entries=30 op=nft_register_rule pid=5865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:36.154000 audit[5865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffffddcc450 a2=0 a3=1 items=0 ppid=2144 pid=5865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.154000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:36.205513 systemd[1]: var-lib-kubelet-pods-c82c1ca9\x2daf53\x2d4961\x2d9e06\x2d6c41aa4edf49-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dwkvlc.mount: Deactivated successfully. May 14 00:48:36.222837 env[1212]: time="2025-05-14T00:48:36.222790095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66fd78b6ff-9fx6f,Uid:cd72b43f-66c5-4044-adfb-186bc2da636a,Namespace:calico-system,Attempt:0,}" May 14 00:48:36.369899 systemd-networkd[1050]: cali6887782a5bb: Link UP May 14 00:48:36.372133 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:48:36.372212 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6887782a5bb: link becomes ready May 14 00:48:36.372269 systemd-networkd[1050]: cali6887782a5bb: Gained carrier May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.268 [INFO][5868] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0 calico-kube-controllers-66fd78b6ff- calico-system cd72b43f-66c5-4044-adfb-186bc2da636a 1316 0 2025-05-14 00:48:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:66fd78b6ff projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-66fd78b6ff-9fx6f eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali6887782a5bb [] []}} ContainerID="5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" Namespace="calico-system" Pod="calico-kube-controllers-66fd78b6ff-9fx6f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.268 [INFO][5868] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" Namespace="calico-system" Pod="calico-kube-controllers-66fd78b6ff-9fx6f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.298 [INFO][5882] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" HandleID="k8s-pod-network.5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" Workload="localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.319 [INFO][5882] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" HandleID="k8s-pod-network.5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" Workload="localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003047e0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-66fd78b6ff-9fx6f", "timestamp":"2025-05-14 00:48:36.298716514 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.320 [INFO][5882] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.320 [INFO][5882] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.320 [INFO][5882] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.324 [INFO][5882] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" host="localhost" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.332 [INFO][5882] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.338 [INFO][5882] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.342 [INFO][5882] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.345 [INFO][5882] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.346 [INFO][5882] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" host="localhost" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.348 [INFO][5882] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.352 [INFO][5882] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" host="localhost" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.363 [INFO][5882] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" host="localhost" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.363 [INFO][5882] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" host="localhost" May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.363 [INFO][5882] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:36.387408 env[1212]: 2025-05-14 00:48:36.363 [INFO][5882] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" HandleID="k8s-pod-network.5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" Workload="localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0" May 14 00:48:36.388413 env[1212]: 2025-05-14 00:48:36.367 [INFO][5868] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" Namespace="calico-system" Pod="calico-kube-controllers-66fd78b6ff-9fx6f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0", GenerateName:"calico-kube-controllers-66fd78b6ff-", Namespace:"calico-system", SelfLink:"", UID:"cd72b43f-66c5-4044-adfb-186bc2da636a", ResourceVersion:"1316", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 48, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66fd78b6ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-66fd78b6ff-9fx6f", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6887782a5bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:36.388413 env[1212]: 2025-05-14 00:48:36.367 [INFO][5868] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.136/32] ContainerID="5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" Namespace="calico-system" Pod="calico-kube-controllers-66fd78b6ff-9fx6f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0" May 14 00:48:36.388413 env[1212]: 2025-05-14 00:48:36.367 [INFO][5868] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6887782a5bb ContainerID="5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" Namespace="calico-system" Pod="calico-kube-controllers-66fd78b6ff-9fx6f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0" May 14 00:48:36.388413 env[1212]: 2025-05-14 00:48:36.372 [INFO][5868] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" Namespace="calico-system" Pod="calico-kube-controllers-66fd78b6ff-9fx6f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0" May 14 00:48:36.388413 env[1212]: 2025-05-14 00:48:36.373 [INFO][5868] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" Namespace="calico-system" Pod="calico-kube-controllers-66fd78b6ff-9fx6f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0", GenerateName:"calico-kube-controllers-66fd78b6ff-", Namespace:"calico-system", SelfLink:"", UID:"cd72b43f-66c5-4044-adfb-186bc2da636a", ResourceVersion:"1316", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 48, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66fd78b6ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a", Pod:"calico-kube-controllers-66fd78b6ff-9fx6f", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6887782a5bb", MAC:"36:b5:f8:ee:10:62", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:36.388413 env[1212]: 2025-05-14 00:48:36.385 [INFO][5868] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a" Namespace="calico-system" Pod="calico-kube-controllers-66fd78b6ff-9fx6f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66fd78b6ff--9fx6f-eth0" May 14 00:48:36.397000 audit[5903]: NETFILTER_CFG table=filter:131 family=2 entries=46 op=nft_register_chain pid=5903 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:36.397000 audit[5903]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22188 a0=3 a1=fffffd5d3470 a2=0 a3=ffffb823efa8 items=0 ppid=4733 pid=5903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.397000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:36.407782 env[1212]: time="2025-05-14T00:48:36.407659708Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:36.407782 env[1212]: time="2025-05-14T00:48:36.407697026Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:36.407782 env[1212]: time="2025-05-14T00:48:36.407707305Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:36.407988 env[1212]: time="2025-05-14T00:48:36.407865695Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a pid=5912 runtime=io.containerd.runc.v2 May 14 00:48:36.424599 systemd[1]: Started cri-containerd-5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a.scope. May 14 00:48:36.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.442000 audit: BPF prog-id=216 op=LOAD May 14 00:48:36.442000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.442000 audit[5922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5912 pid=5922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633531633832616430333438663165336531343039363232633932 May 14 00:48:36.442000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.442000 audit[5922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5912 pid=5922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633531633832616430333438663165336531343039363232633932 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit: BPF prog-id=217 op=LOAD May 14 00:48:36.443000 audit[5922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5912 pid=5922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633531633832616430333438663165336531343039363232633932 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.443000 audit: BPF prog-id=218 op=LOAD May 14 00:48:36.443000 audit[5922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5912 pid=5922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633531633832616430333438663165336531343039363232633932 May 14 00:48:36.444000 audit: BPF prog-id=218 op=UNLOAD May 14 00:48:36.444000 audit: BPF prog-id=217 op=UNLOAD May 14 00:48:36.444000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.444000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.444000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.444000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.444000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.444000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.444000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.444000 audit[5922]: AVC avc: denied { perfmon } for pid=5922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.444000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.444000 audit[5922]: AVC avc: denied { bpf } for pid=5922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.444000 audit: BPF prog-id=219 op=LOAD May 14 00:48:36.444000 audit[5922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5912 pid=5922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633531633832616430333438663165336531343039363232633932 May 14 00:48:36.445984 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:36.462092 env[1212]: time="2025-05-14T00:48:36.461996173Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66fd78b6ff-9fx6f,Uid:cd72b43f-66c5-4044-adfb-186bc2da636a,Namespace:calico-system,Attempt:0,} returns sandbox id \"5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a\"" May 14 00:48:36.470083 env[1212]: time="2025-05-14T00:48:36.470048399Z" level=info msg="CreateContainer within sandbox \"5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 14 00:48:36.486666 env[1212]: time="2025-05-14T00:48:36.486603463Z" level=info msg="CreateContainer within sandbox \"5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"5ac9cf8abbef723788411763f68083986bea0f49e93ed832109bf2cb2858b62a\"" May 14 00:48:36.487132 env[1212]: time="2025-05-14T00:48:36.487096512Z" level=info msg="StartContainer for \"5ac9cf8abbef723788411763f68083986bea0f49e93ed832109bf2cb2858b62a\"" May 14 00:48:36.501015 systemd[1]: Started cri-containerd-5ac9cf8abbef723788411763f68083986bea0f49e93ed832109bf2cb2858b62a.scope. May 14 00:48:36.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.519000 audit: BPF prog-id=220 op=LOAD May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5912 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633963663861626265663732333738383431313736336636383038 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5912 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633963663861626265663732333738383431313736336636383038 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit: BPF prog-id=221 op=LOAD May 14 00:48:36.520000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5912 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633963663861626265663732333738383431313736336636383038 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit: BPF prog-id=222 op=LOAD May 14 00:48:36.520000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5912 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633963663861626265663732333738383431313736336636383038 May 14 00:48:36.520000 audit: BPF prog-id=222 op=UNLOAD May 14 00:48:36.520000 audit: BPF prog-id=221 op=UNLOAD May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.520000 audit: BPF prog-id=223 op=LOAD May 14 00:48:36.520000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5912 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633963663861626265663732333738383431313736336636383038 May 14 00:48:36.546805 env[1212]: time="2025-05-14T00:48:36.546761690Z" level=info msg="StartContainer for \"5ac9cf8abbef723788411763f68083986bea0f49e93ed832109bf2cb2858b62a\" returns successfully" May 14 00:48:36.953096 kubelet[1952]: I0514 00:48:36.953017 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-66fd78b6ff-9fx6f" podStartSLOduration=1.9530001970000002 podStartE2EDuration="1.953000197s" podCreationTimestamp="2025-05-14 00:48:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:48:36.910992895 +0000 UTC m=+65.328131140" watchObservedRunningTime="2025-05-14 00:48:36.953000197 +0000 UTC m=+65.370138442" May 14 00:48:37.206761 systemd[1]: run-containerd-runc-k8s.io-5dc51c82ad0348f1e3e1409622c9222028b2a9a692811b3d2fefa34dfe8d402a-runc.duUc23.mount: Deactivated successfully. May 14 00:48:37.486830 systemd-networkd[1050]: cali6887782a5bb: Gained IPv6LL May 14 00:48:37.679582 kubelet[1952]: I0514 00:48:37.679540 1952 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="c82c1ca9-af53-4961-9e06-6c41aa4edf49" path="/var/lib/kubelet/pods/c82c1ca9-af53-4961-9e06-6c41aa4edf49/volumes" May 14 00:48:38.767000 audit[6047]: NETFILTER_CFG table=filter:132 family=2 entries=20 op=nft_register_rule pid=6047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:38.770528 kernel: kauditd_printk_skb: 208 callbacks suppressed May 14 00:48:38.770612 kernel: audit: type=1325 audit(1747183718.767:1568): table=filter:132 family=2 entries=20 op=nft_register_rule pid=6047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:38.767000 audit[6047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd0f27610 a2=0 a3=1 items=0 ppid=2144 pid=6047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:38.776303 kernel: audit: type=1300 audit(1747183718.767:1568): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd0f27610 a2=0 a3=1 items=0 ppid=2144 pid=6047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:38.776385 kernel: audit: type=1327 audit(1747183718.767:1568): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:38.767000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:38.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.97:22-10.0.0.1:60288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:38.779883 systemd[1]: Started sshd@20-10.0.0.97:22-10.0.0.1:60288.service. May 14 00:48:38.784425 kernel: audit: type=1130 audit(1747183718.778:1569): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.97:22-10.0.0.1:60288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:38.787000 audit[6047]: NETFILTER_CFG table=nat:133 family=2 entries=106 op=nft_register_chain pid=6047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:38.787000 audit[6047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd0f27610 a2=0 a3=1 items=0 ppid=2144 pid=6047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:38.797775 kernel: audit: type=1325 audit(1747183718.787:1570): table=nat:133 family=2 entries=106 op=nft_register_chain pid=6047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:38.797865 kernel: audit: type=1300 audit(1747183718.787:1570): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd0f27610 a2=0 a3=1 items=0 ppid=2144 pid=6047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:38.797888 kernel: audit: type=1327 audit(1747183718.787:1570): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:38.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:38.826000 audit[6049]: USER_ACCT pid=6049 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:38.828256 sshd[6049]: Accepted publickey for core from 10.0.0.1 port 60288 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:38.830003 sshd[6049]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:38.828000 audit[6049]: CRED_ACQ pid=6049 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:38.834310 kernel: audit: type=1101 audit(1747183718.826:1571): pid=6049 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:38.834365 kernel: audit: type=1103 audit(1747183718.828:1572): pid=6049 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:38.834408 kernel: audit: type=1006 audit(1747183718.828:1573): pid=6049 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 14 00:48:38.834693 systemd-logind[1200]: New session 21 of user core. May 14 00:48:38.834774 systemd[1]: Started session-21.scope. May 14 00:48:38.828000 audit[6049]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb077f40 a2=3 a3=1 items=0 ppid=1 pid=6049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:38.828000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:38.837000 audit[6049]: USER_START pid=6049 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:38.838000 audit[6051]: CRED_ACQ pid=6051 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:38.956312 sshd[6049]: pam_unix(sshd:session): session closed for user core May 14 00:48:38.955000 audit[6049]: USER_END pid=6049 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:38.955000 audit[6049]: CRED_DISP pid=6049 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:38.958814 systemd[1]: session-21.scope: Deactivated successfully. May 14 00:48:38.959382 systemd-logind[1200]: Session 21 logged out. Waiting for processes to exit. May 14 00:48:38.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.97:22-10.0.0.1:60288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:38.959528 systemd[1]: sshd@20-10.0.0.97:22-10.0.0.1:60288.service: Deactivated successfully. May 14 00:48:38.960802 systemd-logind[1200]: Removed session 21. May 14 00:48:39.782898 systemd[1]: cri-containerd-f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71.scope: Deactivated successfully. May 14 00:48:39.781000 audit: BPF prog-id=126 op=UNLOAD May 14 00:48:39.786000 audit: BPF prog-id=129 op=UNLOAD May 14 00:48:39.787000 audit[6087]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=6087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:39.787000 audit[6087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffdcf35890 a2=0 a3=1 items=0 ppid=2144 pid=6087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:39.793000 audit[6087]: NETFILTER_CFG table=nat:135 family=2 entries=56 op=nft_register_chain pid=6087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:39.793000 audit[6087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18692 a0=3 a1=ffffdcf35890 a2=0 a3=1 items=0 ppid=2144 pid=6087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:39.803589 env[1212]: time="2025-05-14T00:48:39.803544408Z" level=info msg="shim disconnected" id=f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71 May 14 00:48:39.803589 env[1212]: time="2025-05-14T00:48:39.803587806Z" level=warning msg="cleaning up after shim disconnected" id=f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71 namespace=k8s.io May 14 00:48:39.803871 env[1212]: time="2025-05-14T00:48:39.803598245Z" level=info msg="cleaning up dead shim" May 14 00:48:39.805790 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71-rootfs.mount: Deactivated successfully. May 14 00:48:39.811143 env[1212]: time="2025-05-14T00:48:39.811105680Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6099 runtime=io.containerd.runc.v2\n" May 14 00:48:39.836150 env[1212]: time="2025-05-14T00:48:39.836104093Z" level=info msg="StopContainer for \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\" returns successfully" May 14 00:48:39.837323 env[1212]: time="2025-05-14T00:48:39.837286669Z" level=info msg="StopPodSandbox for \"9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d\"" May 14 00:48:39.837593 env[1212]: time="2025-05-14T00:48:39.837567174Z" level=info msg="Container to stop \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 14 00:48:39.840487 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d-shm.mount: Deactivated successfully. May 14 00:48:39.845233 systemd[1]: cri-containerd-9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d.scope: Deactivated successfully. May 14 00:48:39.844000 audit: BPF prog-id=118 op=UNLOAD May 14 00:48:39.851000 audit: BPF prog-id=121 op=UNLOAD May 14 00:48:39.866331 env[1212]: time="2025-05-14T00:48:39.866290185Z" level=info msg="shim disconnected" id=9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d May 14 00:48:39.866562 env[1212]: time="2025-05-14T00:48:39.866540652Z" level=warning msg="cleaning up after shim disconnected" id=9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d namespace=k8s.io May 14 00:48:39.866638 env[1212]: time="2025-05-14T00:48:39.866623967Z" level=info msg="cleaning up dead shim" May 14 00:48:39.868089 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d-rootfs.mount: Deactivated successfully. May 14 00:48:39.875932 env[1212]: time="2025-05-14T00:48:39.875887948Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6130 runtime=io.containerd.runc.v2\n" May 14 00:48:39.883332 env[1212]: time="2025-05-14T00:48:39.883289069Z" level=info msg="TearDown network for sandbox \"9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d\" successfully" May 14 00:48:39.883332 env[1212]: time="2025-05-14T00:48:39.883326107Z" level=info msg="StopPodSandbox for \"9936868bea5f39ad90175832c9601dd18009fdc21870474e42e827dd977bec1d\" returns successfully" May 14 00:48:39.896590 kubelet[1952]: I0514 00:48:39.896545 1952 scope.go:117] "RemoveContainer" containerID="f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71" May 14 00:48:39.897743 env[1212]: time="2025-05-14T00:48:39.897708531Z" level=info msg="RemoveContainer for \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\"" May 14 00:48:39.901428 env[1212]: time="2025-05-14T00:48:39.900996434Z" level=info msg="RemoveContainer for \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\" returns successfully" May 14 00:48:39.903065 kubelet[1952]: I0514 00:48:39.902736 1952 scope.go:117] "RemoveContainer" containerID="f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71" May 14 00:48:39.904297 env[1212]: time="2025-05-14T00:48:39.904212581Z" level=error msg="ContainerStatus for \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\": not found" May 14 00:48:39.904444 kubelet[1952]: E0514 00:48:39.904387 1952 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\": not found" containerID="f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71" May 14 00:48:39.904500 kubelet[1952]: I0514 00:48:39.904433 1952 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71"} err="failed to get container status \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\": rpc error: code = NotFound desc = an error occurred when try to find container \"f8a352492d0db7afcec5814c17cba64c248c9eb715930a76cafc8b8ff2bebd71\": not found" May 14 00:48:39.910000 audit[6144]: NETFILTER_CFG table=filter:136 family=2 entries=8 op=nft_register_rule pid=6144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:39.910000 audit[6144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd3d63320 a2=0 a3=1 items=0 ppid=2144 pid=6144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:39.918000 audit[6144]: NETFILTER_CFG table=nat:137 family=2 entries=54 op=nft_register_rule pid=6144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:39.918000 audit[6144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=ffffd3d63320 a2=0 a3=1 items=0 ppid=2144 pid=6144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.918000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:39.969593 kubelet[1952]: I0514 00:48:39.969129 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-nj4sx\" (UniqueName: \"kubernetes.io/projected/096a221f-a99d-4950-92de-fcb13d7c8ed1-kube-api-access-nj4sx\") pod \"096a221f-a99d-4950-92de-fcb13d7c8ed1\" (UID: \"096a221f-a99d-4950-92de-fcb13d7c8ed1\") " May 14 00:48:39.969593 kubelet[1952]: I0514 00:48:39.969204 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/096a221f-a99d-4950-92de-fcb13d7c8ed1-typha-certs\") pod \"096a221f-a99d-4950-92de-fcb13d7c8ed1\" (UID: \"096a221f-a99d-4950-92de-fcb13d7c8ed1\") " May 14 00:48:39.969593 kubelet[1952]: I0514 00:48:39.969224 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/096a221f-a99d-4950-92de-fcb13d7c8ed1-tigera-ca-bundle\") pod \"096a221f-a99d-4950-92de-fcb13d7c8ed1\" (UID: \"096a221f-a99d-4950-92de-fcb13d7c8ed1\") " May 14 00:48:39.974002 systemd[1]: var-lib-kubelet-pods-096a221f\x2da99d\x2d4950\x2d92de\x2dfcb13d7c8ed1-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dnj4sx.mount: Deactivated successfully. May 14 00:48:39.974106 systemd[1]: var-lib-kubelet-pods-096a221f\x2da99d\x2d4950\x2d92de\x2dfcb13d7c8ed1-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. May 14 00:48:39.974869 kubelet[1952]: I0514 00:48:39.974802 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/096a221f-a99d-4950-92de-fcb13d7c8ed1-kube-api-access-nj4sx" (OuterVolumeSpecName: "kube-api-access-nj4sx") pod "096a221f-a99d-4950-92de-fcb13d7c8ed1" (UID: "096a221f-a99d-4950-92de-fcb13d7c8ed1"). InnerVolumeSpecName "kube-api-access-nj4sx". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 14 00:48:39.977586 kubelet[1952]: I0514 00:48:39.977548 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/096a221f-a99d-4950-92de-fcb13d7c8ed1-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "096a221f-a99d-4950-92de-fcb13d7c8ed1" (UID: "096a221f-a99d-4950-92de-fcb13d7c8ed1"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 14 00:48:39.980186 kubelet[1952]: I0514 00:48:39.980156 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/096a221f-a99d-4950-92de-fcb13d7c8ed1-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "096a221f-a99d-4950-92de-fcb13d7c8ed1" (UID: "096a221f-a99d-4950-92de-fcb13d7c8ed1"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 14 00:48:40.069831 kubelet[1952]: I0514 00:48:40.069788 1952 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-nj4sx\" (UniqueName: \"kubernetes.io/projected/096a221f-a99d-4950-92de-fcb13d7c8ed1-kube-api-access-nj4sx\") on node \"localhost\" DevicePath \"\"" May 14 00:48:40.069831 kubelet[1952]: I0514 00:48:40.069821 1952 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/096a221f-a99d-4950-92de-fcb13d7c8ed1-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 14 00:48:40.069831 kubelet[1952]: I0514 00:48:40.069833 1952 reconciler_common.go:299] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/096a221f-a99d-4950-92de-fcb13d7c8ed1-typha-certs\") on node \"localhost\" DevicePath \"\"" May 14 00:48:40.203938 systemd[1]: Removed slice kubepods-besteffort-pod096a221f_a99d_4950_92de_fcb13d7c8ed1.slice. May 14 00:48:40.805421 systemd[1]: var-lib-kubelet-pods-096a221f\x2da99d\x2d4950\x2d92de\x2dfcb13d7c8ed1-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. May 14 00:48:41.224000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.224000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.224000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.224000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.224000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.224000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.224000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.224000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.224000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.224000 audit: BPF prog-id=224 op=LOAD May 14 00:48:41.224000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffecafb968 a2=98 a3=ffffecafb958 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.224000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.225000 audit: BPF prog-id=224 op=UNLOAD May 14 00:48:41.225000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit: BPF prog-id=225 op=LOAD May 14 00:48:41.225000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffecafb5f8 a2=74 a3=95 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.225000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.225000 audit: BPF prog-id=225 op=UNLOAD May 14 00:48:41.225000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.225000 audit: BPF prog-id=226 op=LOAD May 14 00:48:41.225000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffecafb658 a2=94 a3=2 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.225000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.225000 audit: BPF prog-id=226 op=UNLOAD May 14 00:48:41.312000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.312000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.312000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.312000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.312000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.312000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.312000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.312000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.312000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.312000 audit: BPF prog-id=227 op=LOAD May 14 00:48:41.312000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffecafb618 a2=40 a3=ffffecafb648 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.312000 audit: BPF prog-id=227 op=UNLOAD May 14 00:48:41.312000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.312000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffecafb730 a2=50 a3=0 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffecafb688 a2=28 a3=ffffecafb7b8 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecafb6b8 a2=28 a3=ffffecafb7e8 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecafb568 a2=28 a3=ffffecafb698 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffecafb6d8 a2=28 a3=ffffecafb808 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffecafb6b8 a2=28 a3=ffffecafb7e8 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffecafb6a8 a2=28 a3=ffffecafb7d8 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffecafb6d8 a2=28 a3=ffffecafb808 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecafb6b8 a2=28 a3=ffffecafb7e8 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecafb6d8 a2=28 a3=ffffecafb808 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecafb6a8 a2=28 a3=ffffecafb7d8 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffecafb728 a2=28 a3=ffffecafb868 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffecafb460 a2=50 a3=0 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit: BPF prog-id=228 op=LOAD May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffecafb468 a2=94 a3=5 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit: BPF prog-id=228 op=UNLOAD May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffecafb570 a2=50 a3=0 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffecafb6b8 a2=4 a3=3 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { confidentiality } for pid=6187 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffecafb698 a2=94 a3=6 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { confidentiality } for pid=6187 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffecafae68 a2=94 a3=83 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { bpf } for pid=6187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: AVC avc: denied { perfmon } for pid=6187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.321000 audit[6187]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffecafae68 a2=94 a3=83 items=0 ppid=6171 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit: BPF prog-id=229 op=LOAD May 14 00:48:41.324000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd70bf6f8 a2=98 a3=ffffd70bf6e8 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.324000 audit: BPF prog-id=229 op=UNLOAD May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit: BPF prog-id=230 op=LOAD May 14 00:48:41.324000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd70bf388 a2=74 a3=95 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.324000 audit: BPF prog-id=230 op=UNLOAD May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.324000 audit: BPF prog-id=231 op=LOAD May 14 00:48:41.324000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd70bf3e8 a2=94 a3=2 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.324000 audit: BPF prog-id=231 op=UNLOAD May 14 00:48:41.410000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.410000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.410000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.410000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.410000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.410000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.410000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.410000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.410000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.410000 audit: BPF prog-id=232 op=LOAD May 14 00:48:41.410000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd70bf3a8 a2=40 a3=ffffd70bf3d8 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.410000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.410000 audit: BPF prog-id=232 op=UNLOAD May 14 00:48:41.410000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.410000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd70bf4c0 a2=50 a3=0 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.410000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.419000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.419000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd70bf418 a2=28 a3=ffffd70bf548 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.419000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd70bf448 a2=28 a3=ffffd70bf578 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd70bf2f8 a2=28 a3=ffffd70bf428 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd70bf468 a2=28 a3=ffffd70bf598 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd70bf448 a2=28 a3=ffffd70bf578 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd70bf438 a2=28 a3=ffffd70bf568 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd70bf468 a2=28 a3=ffffd70bf598 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd70bf448 a2=28 a3=ffffd70bf578 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd70bf468 a2=28 a3=ffffd70bf598 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd70bf438 a2=28 a3=ffffd70bf568 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd70bf4b8 a2=28 a3=ffffd70bf5f8 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd70bf1f0 a2=50 a3=0 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit: BPF prog-id=233 op=LOAD May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd70bf1f8 a2=94 a3=5 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit: BPF prog-id=233 op=UNLOAD May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd70bf300 a2=50 a3=0 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd70bf448 a2=4 a3=3 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { confidentiality } for pid=6188 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd70bf428 a2=94 a3=6 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { confidentiality } for pid=6188 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd70bebf8 a2=94 a3=83 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: AVC avc: denied { perfmon } for pid=6188 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.420000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd70bebf8 a2=94 a3=83 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.422000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.422000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.423000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.423000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.424000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.424000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.425000 audit[6188]: AVC avc: denied { bpf } for pid=6188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.425000 audit[6188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd70c0638 a2=10 a3=ffffd70c0728 items=0 ppid=6171 pid=6188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit: BPF prog-id=234 op=LOAD May 14 00:48:41.437000 audit[6200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffce180cd8 a2=98 a3=ffffce180cc8 items=0 ppid=6171 pid=6200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.437000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:41.437000 audit: BPF prog-id=234 op=UNLOAD May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit: BPF prog-id=235 op=LOAD May 14 00:48:41.437000 audit[6200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffce180b88 a2=74 a3=95 items=0 ppid=6171 pid=6200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.437000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:41.437000 audit: BPF prog-id=235 op=UNLOAD May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:41.437000 audit: BPF prog-id=236 op=LOAD May 14 00:48:41.437000 audit[6200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffce180bb8 a2=40 a3=ffffce180be8 items=0 ppid=6171 pid=6200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:41.437000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:41.437000 audit: BPF prog-id=236 op=UNLOAD May 14 00:48:41.679400 kubelet[1952]: I0514 00:48:41.679340 1952 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="096a221f-a99d-4950-92de-fcb13d7c8ed1" path="/var/lib/kubelet/pods/096a221f-a99d-4950-92de-fcb13d7c8ed1/volumes" May 14 00:48:43.960699 systemd[1]: Started sshd@21-10.0.0.97:22-10.0.0.1:50410.service. May 14 00:48:43.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.97:22-10.0.0.1:50410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:43.961706 kernel: kauditd_printk_skb: 555 callbacks suppressed May 14 00:48:43.961746 kernel: audit: type=1130 audit(1747183723.959:1710): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.97:22-10.0.0.1:50410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:43.997000 audit[6275]: USER_ACCT pid=6275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:43.999109 sshd[6275]: Accepted publickey for core from 10.0.0.1 port 50410 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:44.000441 sshd[6275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:43.998000 audit[6275]: CRED_ACQ pid=6275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:44.004565 systemd-logind[1200]: New session 22 of user core. May 14 00:48:44.005586 kernel: audit: type=1101 audit(1747183723.997:1711): pid=6275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:44.005617 kernel: audit: type=1103 audit(1747183723.998:1712): pid=6275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:44.005633 kernel: audit: type=1006 audit(1747183723.998:1713): pid=6275 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 14 00:48:44.005097 systemd[1]: Started session-22.scope. May 14 00:48:43.998000 audit[6275]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdaf41900 a2=3 a3=1 items=0 ppid=1 pid=6275 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:44.010110 kernel: audit: type=1300 audit(1747183723.998:1713): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdaf41900 a2=3 a3=1 items=0 ppid=1 pid=6275 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:44.010176 kernel: audit: type=1327 audit(1747183723.998:1713): proctitle=737368643A20636F7265205B707269765D May 14 00:48:43.998000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:44.007000 audit[6275]: USER_START pid=6275 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:44.014759 kernel: audit: type=1105 audit(1747183724.007:1714): pid=6275 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:44.014805 kernel: audit: type=1103 audit(1747183724.008:1715): pid=6277 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:44.008000 audit[6277]: CRED_ACQ pid=6277 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:44.125768 sshd[6275]: pam_unix(sshd:session): session closed for user core May 14 00:48:44.125000 audit[6275]: USER_END pid=6275 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:44.128537 systemd[1]: sshd@21-10.0.0.97:22-10.0.0.1:50410.service: Deactivated successfully. May 14 00:48:44.129297 systemd[1]: session-22.scope: Deactivated successfully. May 14 00:48:44.129872 systemd-logind[1200]: Session 22 logged out. Waiting for processes to exit. May 14 00:48:44.130521 systemd-logind[1200]: Removed session 22. May 14 00:48:44.125000 audit[6275]: CRED_DISP pid=6275 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:44.133345 kernel: audit: type=1106 audit(1747183724.125:1716): pid=6275 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:44.133411 kernel: audit: type=1104 audit(1747183724.125:1717): pid=6275 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:44.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.97:22-10.0.0.1:50410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:47.676771 kubelet[1952]: E0514 00:48:47.676720 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:48.676895 kubelet[1952]: E0514 00:48:48.676824 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:49.130918 systemd[1]: Started sshd@22-10.0.0.97:22-10.0.0.1:50412.service. May 14 00:48:49.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.97:22-10.0.0.1:50412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:49.131998 kernel: kauditd_printk_skb: 1 callbacks suppressed May 14 00:48:49.132173 kernel: audit: type=1130 audit(1747183729.129:1719): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.97:22-10.0.0.1:50412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:49.167000 audit[6382]: USER_ACCT pid=6382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.169071 sshd[6382]: Accepted publickey for core from 10.0.0.1 port 50412 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:49.170450 sshd[6382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:49.168000 audit[6382]: CRED_ACQ pid=6382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.174310 systemd[1]: Started session-23.scope. May 14 00:48:49.174763 systemd-logind[1200]: New session 23 of user core. May 14 00:48:49.175337 kernel: audit: type=1101 audit(1747183729.167:1720): pid=6382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.175363 kernel: audit: type=1103 audit(1747183729.168:1721): pid=6382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.175378 kernel: audit: type=1006 audit(1747183729.168:1722): pid=6382 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 14 00:48:49.168000 audit[6382]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa9cfbd0 a2=3 a3=1 items=0 ppid=1 pid=6382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.180363 kernel: audit: type=1300 audit(1747183729.168:1722): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa9cfbd0 a2=3 a3=1 items=0 ppid=1 pid=6382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.168000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:49.181699 kernel: audit: type=1327 audit(1747183729.168:1722): proctitle=737368643A20636F7265205B707269765D May 14 00:48:49.179000 audit[6382]: USER_START pid=6382 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.185255 kernel: audit: type=1105 audit(1747183729.179:1723): pid=6382 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.180000 audit[6384]: CRED_ACQ pid=6384 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.188335 kernel: audit: type=1103 audit(1747183729.180:1724): pid=6384 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.304595 sshd[6382]: pam_unix(sshd:session): session closed for user core May 14 00:48:49.304000 audit[6382]: USER_END pid=6382 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.307159 systemd[1]: sshd@22-10.0.0.97:22-10.0.0.1:50412.service: Deactivated successfully. May 14 00:48:49.307931 systemd[1]: session-23.scope: Deactivated successfully. May 14 00:48:49.308432 systemd-logind[1200]: Session 23 logged out. Waiting for processes to exit. May 14 00:48:49.309067 systemd-logind[1200]: Removed session 23. May 14 00:48:49.304000 audit[6382]: CRED_DISP pid=6382 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.313210 kernel: audit: type=1106 audit(1747183729.304:1725): pid=6382 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.313268 kernel: audit: type=1104 audit(1747183729.304:1726): pid=6382 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:49.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.97:22-10.0.0.1:50412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:49.962545 env[1212]: time="2025-05-14T00:48:49.962497479Z" level=info msg="StopContainer for \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\" with timeout 30 (s)" May 14 00:48:49.962930 env[1212]: time="2025-05-14T00:48:49.962899026Z" level=info msg="Stop container \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\" with signal terminated" May 14 00:48:49.969000 audit[6418]: NETFILTER_CFG table=filter:138 family=2 entries=8 op=nft_register_rule pid=6418 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:49.969000 audit[6418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff5289f30 a2=0 a3=1 items=0 ppid=2144 pid=6418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:49.978237 systemd[1]: cri-containerd-3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79.scope: Deactivated successfully. May 14 00:48:49.977000 audit: BPF prog-id=179 op=UNLOAD May 14 00:48:49.978608 systemd[1]: cri-containerd-3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79.scope: Consumed 2.464s CPU time. May 14 00:48:49.982000 audit[6418]: NETFILTER_CFG table=nat:139 family=2 entries=64 op=nft_register_chain pid=6418 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:49.982000 audit[6418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22340 a0=3 a1=fffff5289f30 a2=0 a3=1 items=0 ppid=2144 pid=6418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.982000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:49.984000 audit: BPF prog-id=182 op=UNLOAD May 14 00:48:49.997000 audit[6438]: NETFILTER_CFG table=filter:140 family=2 entries=8 op=nft_register_rule pid=6438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:49.997000 audit[6438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc71947c0 a2=0 a3=1 items=0 ppid=2144 pid=6438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.997000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:50.002434 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79-rootfs.mount: Deactivated successfully. May 14 00:48:50.003572 env[1212]: time="2025-05-14T00:48:50.003522945Z" level=info msg="shim disconnected" id=3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79 May 14 00:48:50.003641 env[1212]: time="2025-05-14T00:48:50.003574503Z" level=warning msg="cleaning up after shim disconnected" id=3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79 namespace=k8s.io May 14 00:48:50.003641 env[1212]: time="2025-05-14T00:48:50.003585223Z" level=info msg="cleaning up dead shim" May 14 00:48:50.004000 audit[6438]: NETFILTER_CFG table=nat:141 family=2 entries=64 op=nft_unregister_chain pid=6438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:50.004000 audit[6438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20580 a0=3 a1=ffffc71947c0 a2=0 a3=1 items=0 ppid=2144 pid=6438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:50.004000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:50.011343 env[1212]: time="2025-05-14T00:48:50.011302897Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6439 runtime=io.containerd.runc.v2\n" May 14 00:48:50.029985 env[1212]: time="2025-05-14T00:48:50.029931383Z" level=info msg="StopContainer for \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\" returns successfully" May 14 00:48:50.030519 env[1212]: time="2025-05-14T00:48:50.030495445Z" level=info msg="StopPodSandbox for \"46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce\"" May 14 00:48:50.030649 env[1212]: time="2025-05-14T00:48:50.030558043Z" level=info msg="Container to stop \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 14 00:48:50.032833 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce-shm.mount: Deactivated successfully. May 14 00:48:50.039992 systemd[1]: cri-containerd-46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce.scope: Deactivated successfully. May 14 00:48:50.038000 audit: BPF prog-id=175 op=UNLOAD May 14 00:48:50.044000 audit: BPF prog-id=178 op=UNLOAD May 14 00:48:50.057317 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce-rootfs.mount: Deactivated successfully. May 14 00:48:50.058281 env[1212]: time="2025-05-14T00:48:50.058233120Z" level=info msg="shim disconnected" id=46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce May 14 00:48:50.058357 env[1212]: time="2025-05-14T00:48:50.058284958Z" level=warning msg="cleaning up after shim disconnected" id=46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce namespace=k8s.io May 14 00:48:50.058357 env[1212]: time="2025-05-14T00:48:50.058295318Z" level=info msg="cleaning up dead shim" May 14 00:48:50.065797 env[1212]: time="2025-05-14T00:48:50.065751320Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6469 runtime=io.containerd.runc.v2\n" May 14 00:48:50.113620 systemd-networkd[1050]: cali50439b52c1d: Link DOWN May 14 00:48:50.113628 systemd-networkd[1050]: cali50439b52c1d: Lost carrier May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.111 [INFO][6498] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.112 [INFO][6498] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" iface="eth0" netns="/var/run/netns/cni-ccf895d5-2cda-919a-ce04-48275caf75ef" May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.112 [INFO][6498] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" iface="eth0" netns="/var/run/netns/cni-ccf895d5-2cda-919a-ce04-48275caf75ef" May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.137 [INFO][6498] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" after=25.163037ms iface="eth0" netns="/var/run/netns/cni-ccf895d5-2cda-919a-ce04-48275caf75ef" May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.137 [INFO][6498] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.137 [INFO][6498] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.156 [INFO][6508] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" HandleID="k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.156 [INFO][6508] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.156 [INFO][6508] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.221 [INFO][6508] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" HandleID="k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.221 [INFO][6508] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" HandleID="k8s-pod-network.46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" Workload="localhost-k8s-calico--apiserver--645b7c96b4--7lzps-eth0" May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.223 [INFO][6508] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:50.225916 env[1212]: 2025-05-14 00:48:50.224 [INFO][6498] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce" May 14 00:48:50.228070 systemd[1]: run-netns-cni\x2dccf895d5\x2d2cda\x2d919a\x2dce04\x2d48275caf75ef.mount: Deactivated successfully. May 14 00:48:50.229687 env[1212]: time="2025-05-14T00:48:50.229646173Z" level=info msg="TearDown network for sandbox \"46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce\" successfully" May 14 00:48:50.229687 env[1212]: time="2025-05-14T00:48:50.229685332Z" level=info msg="StopPodSandbox for \"46c51f6849c50e9a676bbfa14ad8c8909965e128affd285e1a45e0ea1cc8e8ce\" returns successfully" May 14 00:48:50.331520 kubelet[1952]: I0514 00:48:50.331480 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/07c3c723-015f-4039-b023-092360f2960b-calico-apiserver-certs\") pod \"07c3c723-015f-4039-b023-092360f2960b\" (UID: \"07c3c723-015f-4039-b023-092360f2960b\") " May 14 00:48:50.331895 kubelet[1952]: I0514 00:48:50.331540 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-dmnf7\" (UniqueName: \"kubernetes.io/projected/07c3c723-015f-4039-b023-092360f2960b-kube-api-access-dmnf7\") pod \"07c3c723-015f-4039-b023-092360f2960b\" (UID: \"07c3c723-015f-4039-b023-092360f2960b\") " May 14 00:48:50.334661 kubelet[1952]: I0514 00:48:50.334627 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/07c3c723-015f-4039-b023-092360f2960b-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "07c3c723-015f-4039-b023-092360f2960b" (UID: "07c3c723-015f-4039-b023-092360f2960b"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 14 00:48:50.336168 systemd[1]: var-lib-kubelet-pods-07c3c723\x2d015f\x2d4039\x2db023\x2d092360f2960b-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2ddmnf7.mount: Deactivated successfully. May 14 00:48:50.336262 systemd[1]: var-lib-kubelet-pods-07c3c723\x2d015f\x2d4039\x2db023\x2d092360f2960b-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 14 00:48:50.337107 kubelet[1952]: I0514 00:48:50.337076 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/07c3c723-015f-4039-b023-092360f2960b-kube-api-access-dmnf7" (OuterVolumeSpecName: "kube-api-access-dmnf7") pod "07c3c723-015f-4039-b023-092360f2960b" (UID: "07c3c723-015f-4039-b023-092360f2960b"). InnerVolumeSpecName "kube-api-access-dmnf7". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 14 00:48:50.432668 kubelet[1952]: I0514 00:48:50.432608 1952 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/07c3c723-015f-4039-b023-092360f2960b-calico-apiserver-certs\") on node \"localhost\" DevicePath \"\"" May 14 00:48:50.432668 kubelet[1952]: I0514 00:48:50.432644 1952 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-dmnf7\" (UniqueName: \"kubernetes.io/projected/07c3c723-015f-4039-b023-092360f2960b-kube-api-access-dmnf7\") on node \"localhost\" DevicePath \"\"" May 14 00:48:50.921607 kubelet[1952]: I0514 00:48:50.921569 1952 scope.go:117] "RemoveContainer" containerID="3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79" May 14 00:48:50.922454 env[1212]: time="2025-05-14T00:48:50.922415079Z" level=info msg="RemoveContainer for \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\"" May 14 00:48:50.926038 env[1212]: time="2025-05-14T00:48:50.925997125Z" level=info msg="RemoveContainer for \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\" returns successfully" May 14 00:48:50.926244 kubelet[1952]: I0514 00:48:50.926217 1952 scope.go:117] "RemoveContainer" containerID="3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79" May 14 00:48:50.926459 env[1212]: time="2025-05-14T00:48:50.926401312Z" level=error msg="ContainerStatus for \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\": not found" May 14 00:48:50.926599 kubelet[1952]: E0514 00:48:50.926569 1952 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\": not found" containerID="3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79" May 14 00:48:50.926848 kubelet[1952]: I0514 00:48:50.926750 1952 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79"} err="failed to get container status \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\": rpc error: code = NotFound desc = an error occurred when try to find container \"3d1823afbfba074d3519c27d7cbf5d2d1a7b76bfd17054c7537ef3303ec73f79\": not found" May 14 00:48:50.927036 systemd[1]: Removed slice kubepods-besteffort-pod07c3c723_015f_4039_b023_092360f2960b.slice. May 14 00:48:50.927117 systemd[1]: kubepods-besteffort-pod07c3c723_015f_4039_b023_092360f2960b.slice: Consumed 2.504s CPU time. May 14 00:48:51.018000 audit[6540]: NETFILTER_CFG table=filter:142 family=2 entries=8 op=nft_register_rule pid=6540 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:51.018000 audit[6540]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffed42aa80 a2=0 a3=1 items=0 ppid=2144 pid=6540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.018000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:51.030000 audit[6540]: NETFILTER_CFG table=nat:143 family=2 entries=60 op=nft_register_rule pid=6540 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:51.030000 audit[6540]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=ffffed42aa80 a2=0 a3=1 items=0 ppid=2144 pid=6540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.030000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:51.679055 kubelet[1952]: I0514 00:48:51.679003 1952 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="07c3c723-015f-4039-b023-092360f2960b" path="/var/lib/kubelet/pods/07c3c723-015f-4039-b023-092360f2960b/volumes" May 14 00:48:54.308597 systemd[1]: Started sshd@23-10.0.0.97:22-10.0.0.1:53234.service. May 14 00:48:54.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.97:22-10.0.0.1:53234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:54.309712 kernel: kauditd_printk_skb: 23 callbacks suppressed May 14 00:48:54.309799 kernel: audit: type=1130 audit(1747183734.308:1738): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.97:22-10.0.0.1:53234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:54.348000 audit[6610]: USER_ACCT pid=6610 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.349224 sshd[6610]: Accepted publickey for core from 10.0.0.1 port 53234 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:48:54.350861 sshd[6610]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:48:54.350000 audit[6610]: CRED_ACQ pid=6610 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.355316 kernel: audit: type=1101 audit(1747183734.348:1739): pid=6610 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.355450 kernel: audit: type=1103 audit(1747183734.350:1740): pid=6610 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.355503 kernel: audit: type=1006 audit(1747183734.350:1741): pid=6610 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 14 00:48:54.350000 audit[6610]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8dcba80 a2=3 a3=1 items=0 ppid=1 pid=6610 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:54.360634 kernel: audit: type=1300 audit(1747183734.350:1741): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8dcba80 a2=3 a3=1 items=0 ppid=1 pid=6610 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:54.350000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:48:54.361863 kernel: audit: type=1327 audit(1747183734.350:1741): proctitle=737368643A20636F7265205B707269765D May 14 00:48:54.363103 systemd-logind[1200]: New session 24 of user core. May 14 00:48:54.363958 systemd[1]: Started session-24.scope. May 14 00:48:54.366000 audit[6610]: USER_START pid=6610 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.368000 audit[6612]: CRED_ACQ pid=6612 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.373657 kernel: audit: type=1105 audit(1747183734.366:1742): pid=6610 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.373735 kernel: audit: type=1103 audit(1747183734.368:1743): pid=6612 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.471308 sshd[6610]: pam_unix(sshd:session): session closed for user core May 14 00:48:54.471000 audit[6610]: USER_END pid=6610 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.473857 systemd[1]: sshd@23-10.0.0.97:22-10.0.0.1:53234.service: Deactivated successfully. May 14 00:48:54.474629 systemd[1]: session-24.scope: Deactivated successfully. May 14 00:48:54.471000 audit[6610]: CRED_DISP pid=6610 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.476534 systemd-logind[1200]: Session 24 logged out. Waiting for processes to exit. May 14 00:48:54.479437 kernel: audit: type=1106 audit(1747183734.471:1744): pid=6610 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.479505 kernel: audit: type=1104 audit(1747183734.471:1745): pid=6610 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:54.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.97:22-10.0.0.1:53234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:54.479895 systemd-logind[1200]: Removed session 24.